Social Media and the U. S. Army: Maintaining a Balance


Book Description

Now that the Department of Defense has permitted the use of social media for both private and official purposes, the question becomes, can the military, the Army in particular, obtain the benefits sought from social media use without seriously compromising individual and operations security? Answering this question required an initial assessment of Army goals and objectives to determine why the Army risked the use of social media. The assessment revealed two reasons. First, the Army needed social media to communicate its inform and influence activities more effectively. Second, social media was the primary means by which soldiers maintained contact with their friends and family. Consequently, social media has become a significant element in maintaining soldier morale. If the Army did not need social media to distribute its inform message, it might have avoided the difficulties created by the personal use of social media. Thus, the security risk posed by the use of social media cannot be reduced to a simple enforcement of operations security rules. Nevertheless, soldiers who are not trained to avoid the disclosure of classified or sensitive information will, through their ingrained habits, present a significant security risk. To understand the situation and to derive the needed training required an initial examination of social media as a means of communications. That discussion along with a discussion of personal soldier use reveals that social media supports the Army inform and influence activity requirements, but introduces the risk of spillage through social media. In other words, soldiers have habits that create vulnerabilities that enemies of the United States can easily exploit. An examination of casual social media use revealed common practices that stand contrary to sound operations security. Comparing social media habits with regulatory requirements produced a list of key elements of required training. The reality is that evolutionary information changes will continue without the military's consent. All military personnel require training on appropriate use of social media now. The Army can institute training that raises awareness of these dangers for all service members. Ideally, social media will become a manageable medium with which to communicate the right messages and maintain good order and discipline within the Armed Forces.




Social Media and the U.S. Army


Book Description

"Now that the Department of Defense has permitted the use of social media for both private and official purposes, the question becomes, can the military, the Army in particular, obtain the benefits sought from social media use without seriously compromising individual and operations security? Answering this question required an initial assessment of Army goals and objectives to determine why the Army risked the use of social media. The assessment revealed two reasons. First, the Army needed social media to communicate its inform and influence activities more effectively. Second, social media was the primary means by which soldiers maintained contact with their friends and family. Consequently, social media has become a significant element in maintaining soldier morale. If the Army did not need social media to distribute its inform message, it might have avoided the difficulties created by the personal use of social media. Thus, the security risk posed by the use of social media cannot be reduced to a simple enforcement of operations security rules. Nevertheless, soldiers who are not trained to avoid the disclosure of classified or sensitive information will, through their ingrained habits, present a significant security risk. To understand the situation and to derive the needed training required an initial examination of social media as a means of communications. That discussion along with a discussion of personal soldier use reveals that social media supports the Army inform and influence activity requirements, but introduces the risk of spillage through social media. In other words, soldiers have habits that create vulnerabilities that enemies of the United States can easily exploit. An examination of casual social media use revealed common practices that stand contrary to sound operations security. Comparing social media habits with regulatory requirements produced a list of key elements of required training."--Abstract.




The United States Army Social Media Handbook Version 3 June 2012


Book Description

Social media represents a shift in the way we as a culture communicate. By using Internet-based platforms like Facebook, Twitter, Flickr and You-Tube, social media provides new ways to connect, interact and learn. People no longer look for news; the news find them. And in the world of social media, the perception of truth can be just as powerful as the truth itself. The Internet moves information quickly, whether for good or bad. Social media, with a variety of available platforms, can instantaneously connect users within a global network, making the transfer of information even more pervasive. Today, social media use is so widespread and transparent that you may already be involved even if you are not actively participating. It is a highly effective tool for reaching large communities and audiences. But this substantial ability to connect with the masses is not without its risks. Using social media to spread information is becoming the standard, so it is important to understand the power, the benefits and the risks associated with using the various platforms. The Army recognizes that social media gives people the ability to communicate with larger audiences faster and in new ways. It has become an important tool for Army messaging and outreach. The Army uses a variety of social media platforms designed to support a range of media from text, audio, pictures and videos; all of which are generated and maintained by organizations and individuals within the Army Family. The Army understands the risks associated with social media and has developed training to help Soldiers and Family members use social media responsibly. Soldiers have always been the Army's best and most effective messengers. Today, Army social media enables the Army Family around town, around the country and around the world to stay connected and spread the Army's key themes and messages. Every time a member of the Army Family joins Army social media, it increases the timely and transparent dissemination of information. It ensures that the Army's story is shared honestly and directly to Americans where they are and whenever they want to see, read or hear it. Social media allows every Soldier to be a part of the Army story and it allows America to connect with its Army. Social media is a cheap, effective and measurable form of communication. The Army uses social media to tell the Army's story, but it also uses social media to listen. On February 25, 2010, the DoD re-issued a Directive-Type Memorandum providing guidelines for military use of social media and acknowledged "that Internet-based capabilities are integral to operations across the Department of Defense." On March 1, 2011, William J. Lynn III, the Deputy Secretary of Defense, reauthorized Directive-Type Memorandum (DTM) 09-026 - Responsible and Effective Use of Internet-based Capabilities (Enclosure 1). The move extends the DTM through May 2012 and outlines how the NIPRNET should be configured to allow access to Internet-based capabilities across all DoD components. All service branches are using social media at different levels, but this DTM indicates that use of social media in the DoD is authorized. The extension is not a permanent solution, but it allows the military to continue using social media until a more permanent list of rules and regulations is established. The Office of the Assistant Secretary of Defense is currently working on all-encompassing policy including data points currently listed in DTM 09- 026 as well as updates to the DoD's 1998 web policy. The DoD instruction is in the creation stage since this policy is presently in draft form. Once vetted and approved, the instruction will be a compendium of everything that will be needed for use of Internet-based capabilities - to include content on ethics, operations security and information assurance. Once published, it will be posted on the Army's SlideShare site.




Lcr, Like, Comment, Retweet


Book Description

Through a survey of more than 500 military elites attending the United States Military Academy and National Defense University, this project seeks to establish the nature and extent of political expression by members of the military throughout social media and whether or not such expression is in keeping with the norm of nonpartisanship. Findings suggest that while most military elites continue to identify as conservative and Republican, fewer appear to do so today than at any other time over the past 30 years. Second, military elites actively use social media networking sites, although younger elites are more prolific in their use. Third, while respondents' nonmilitary friends were more politically active than their military friends, both active duty and retired military actively participate in multiple forms of political and partisan expression, from posting comments on political issues to "friending" political figures. This study concludes by considering the implications these findings carry for the norms of an apolitical, nonpartisan military "Technology and social media make it seductively easy for us to broadcast our private opinions far beyond the confines of our homes. The lines between the professional, personal--and virtual--are blurring. Now more than ever, we have to be exceptionally thoughtful about what we say and how we say it." -- General Martin E. Dempsey, USA (Ret.) Military Leadership and Planners, Congress, Social Media Experts, Academicians in social media and communications Related products: Social Media: The Fastest Growing Vulnerability to the Air Force Mission can be found here: https://bookstore.gpo.gov/products/social-media-fastest-growing-vulnerability-air-force-mission Social Media, The Vital Ground: Can We Hold It? is available here: https://bookstore.gpo.gov/products/social-media-vital-ground-can-we-hold-it Other products published by the US Army, National Defense University Press can be found here: https://bookstore.gpo.gov/agency/national-defense-university-ndu




Understanding Social Media and Mass Mobilization in the Operational Environment - Relevance of Twitter and Facebook Trends in Army's Future Operating Environment, Battleswarm and Future Warfare


Book Description

The advent of social media combined with unfettered access to inexpensive mobile electronic devices has dramatically increased information sharing throughout populations worldwide. Journalists ascribed terms such as "The Facebook Effect" and "The Twitter Revolution" to recent uprisings in the Middle East, crediting social media as a catalyst to those social movements. Factions demanding change utilized social media to assist in mobilizing activist crowds within their own countries and to garner support on the international stage. The degree to which social media facilitated these movements varied in each country, but the fact that social media played a role in the uprisings is indisputable. This monograph proposes that since people will continue to use social media to help influence future social movements, the US Army needs to better understand, anticipate, and exploit the potential threat presented by social media and mass mobilization in future operating environments. In some cases, intelligence analysts can predict or anticipate effects based on simple pattern analysis or other predictive models. In other instances, this may prove impossible. The US Army may find that using principles of complexity theory can provide the most continuously useful guide to gain insights into how factions intent on social unrest use social media to help organize their movements and advance towards a common goal. Planners can understand potential threats using characteristics of self-organization, anticipate using emergent properties, and exploit the properties of networks inherent in complex adaptive systems. Using complex systems thinking, the Army may be able to develop unique operational approaches to cope with these problems in an increasingly complex environment. Acronyms * Introduction * Background * Understand, Anticipate, Exploit Using Principles of Complexity Theory * Defining Terms * Relevance of Social Media and the Army's Future Operating Environment * Increased urbanization will require the US Army to operate in cities * Social media trends * Intersection of trends: battleswarm and possible future warfare * Overview of Egyptian uprisings in 2011 * Common Properties of Complex Systems Provide a Basis for Analysis * Identify the Simple Components before Analyzing the Interactions * Nonlinear Interactions Create Something Superior to the Individual Components * Lack of Central Control Allows for Decentralized Organization * Emergent Behaviors Lead to Evolution of the System * Summary of Common Properties of Complex Systems * Understanding how Mass Mobilization and Social Media Interact through Characteristics of Self-Organization * Clustering Helps Protect Individuals * Flocking and Schooling Assists in Moving Towards a Common Objective * Task Allocation Alters to React to Changing Conditions * Decision-Making through Quorum Sensing * Summary of Characteristics of Self-Organization * Anticipate Using Characteristics of Emergence in a Complex Adaptive System * Information processing through Local Sampling and Statistics * Hierarchical Organizations Promote Survival * Dynamics Determine How the System Changes its Patterns * Systems Adapt through Evolution and Learning * Summary of Emergence in Complex Adaptive Systems * Exploit the Common Properties of Networks * Small World Properties Reveal that Paths in Networks are Shorter than Expected * Long-Tailed Degree Distribution Can Give Insight into Social Network * Clustering and Community Structure Indicate How Quickly Information Travels * Networks May be Vulnerable to Targeted Hub Attacks * Cascading Failure May Collapse the Entire Network * Summary of Network Properties * Conclusion * Bibliography




Strengthening the Military Family Readiness System for a Changing American Society


Book Description

The U.S. military has been continuously engaged in foreign conflicts for over two decades. The strains that these deployments, the associated increases in operational tempo, and the general challenges of military life affect not only service members but also the people who depend on them and who support them as they support the nation â€" their families. Family members provide support to service members while they serve or when they have difficulties; family problems can interfere with the ability of service members to deploy or remain in theater; and family members are central influences on whether members continue to serve. In addition, rising family diversity and complexity will likely increase the difficulty of creating military policies, programs and practices that adequately support families in the performance of military duties. Strengthening the Military Family Readiness System for a Changing American Society examines the challenges and opportunities facing military families and what is known about effective strategies for supporting and protecting military children and families, as well as lessons to be learned from these experiences. This report offers recommendations regarding what is needed to strengthen the support system for military families.




Public Affairs


Book Description

United States Army in Vietnam. CMH Pub. 91-13. Draws upon previously unavailable Army and Defense Department records to interpret the part the press played during the Vietnam War. Discusses the roles of the following in the creation of information policy: Military Assistance Command's Office of Information in Saigon; White House; State Department; Defense Department; and the United States Embassy in Saigon.




United States Army Social Media Handbook


Book Description

Provides extensive social media guidance. It contains information for Army leaders, guidance for Army Families, operations security tips, branding information, checklists, regulations and frequently asked questions.




Likewar


Book Description

Social media has been weaponized, as state hackers and rogue terrorists have seized upon Twitter and Facebook to create chaos and destruction. This urgent report is required reading, from defense experts P.W. Singer and Emerson T. Brooking.




Machine Learning for Computer and Cyber Security


Book Description

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.