Countering Threats: A Comprehensive Model for Utilization of Social Media for Security and Law Enforcement Authorities

Countering Threats: A Comprehensive Model for Utilization of Social Media for Security and Law Enforcement Authorities

Margarita Jaitner
Copyright: © 2014 |Volume: 4 |Issue: 2 |Pages: 11
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466653443|DOI: 10.4018/ijcwt.2014040103
Cite Article Cite Article

MLA

Jaitner, Margarita. "Countering Threats: A Comprehensive Model for Utilization of Social Media for Security and Law Enforcement Authorities." IJCWT vol.4, no.2 2014: pp.35-45. http://doi.org/10.4018/ijcwt.2014040103

APA

Jaitner, M. (2014). Countering Threats: A Comprehensive Model for Utilization of Social Media for Security and Law Enforcement Authorities. International Journal of Cyber Warfare and Terrorism (IJCWT), 4(2), 35-45. http://doi.org/10.4018/ijcwt.2014040103

Chicago

Jaitner, Margarita. "Countering Threats: A Comprehensive Model for Utilization of Social Media for Security and Law Enforcement Authorities," International Journal of Cyber Warfare and Terrorism (IJCWT) 4, no.2: 35-45. http://doi.org/10.4018/ijcwt.2014040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The increased adoption of social media has presented security and law enforcement authorities with significant new challenges. For example, the Swedish Security Service (SÄPO) asserts that a large proportion of radicalization takes place in open fora online. Still, approaches to contain social media-driven challenges to security, particularly in democratic societies, remain little explored. Nonetheless, this type of knowledge may become relevant in European countries in the near future: Amongst other factors, the challenging economic situation has resulted in increased public discontent leading to emergence or manifestation of groups that seek to challenge the existing policies by almost any means. Use of social media multiplies the number of vectors that need law enforcement attention. First, a high level of social media adaption allows groups to reach and attract a wider audience. Unlike previously, many groups today consist of a large but very loosely connected network. This lack of cohesion can present a challenge for authorities, to identify emerging key actors and assess threat levels. Second, a high level of mobile web penetration has allowed groups to ad-hoc organize, amend plans and redirect physical activities. Third, the tool social media is as not exclusive to potential perpetrators of unlawful action, but is as well available to law enforcement authorities. Yet, efficient utilization of social media requires a deep understanding of its nature and a well-crafted, comprehensive approach. Acknowledging the broad functionality of social media, as well as its current status in the society, this article describes a model process for security authorities and law enforcement work with social media in general and security services work in particular. The process is cyclic and largely modular. It provides a set of goals and tasks for each stage of a potential event, rather than fixed activities. This allows authorities to adapt the process to individual legal frameworks and organization setups. The approach behind the process is holistic where social media is regarded as both source and destination of information. Ultimately, the process aims at efficiently and effectively mitigating the risk of virtual and physical violence.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.