recommended reading

DHS Wants Better Social Media Screening Technology

Twin Design/Shutterstock.com

The Department of Homeland Security wants businesses to present their cutting-edge social media analytics services next month -- especially technology that could enhance criminal investigations, traveler screenings and situational awareness.  

In a new request for information, DHS said it is looking for open source analytics tools that can make internal operations more efficient and reduce costs through "advanced analytic automation,” across the department, all while using “privacy, civil rights and civil liberties-protecting analytic methods.”

Respondents have until Feb. 9 to submit descriptions of their analytics capabilities, including geospatial processing, foreign and spoken language processing, and keyword, image and video analysis, among other elements.

DHS plans to ask 30 “exemplars of social media analytics capabilities in the market place” to present technology that could help analysts find patterns “in the context of homeland security investigative, screening and/or homeland security mission related situation awareness missions.”

Those groups will be asked to present on Feb. 26, the RFI said.

The solicitation also asked respondents to describe the way they “protect the privacy, civil rights and civil liberties of individuals involved in open source and social media communications,” including factors such as data removal methods, “role based access to information, user audit, system logging, policy enforcing mechanisms, encryption, etc.”

The announcement comes weeks after federal social media screening policies came under fire, especially in light of the San Bernardino shootings, when it was widely reported that one of the shooters had posted public pro-ISIS messages on Facebook. (Federal Bureau of Investigation director James Comey subsequently said those were private, direct communications.)

DHS policies in particular were criticized last month when Congress blasted the department for not examining immigrants' social media accounts closely and routinely when granting visas, The Hill reported.

DHS officials said they do occasionally look at social media accounts, according to The Hill. But a DHS memo obtained by MSNBC last month found that the department had rejected a policy to screen foreign visa applicants’ social media accounts in 2011, after a year of revisions. 

According to a spokesperson, DHS does not comment on open solicitations and declined Nextgov's request for comment. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.