As an adjunct professor at Utica College, I come across many research papers while teaching Cyber Intelligence, Cyber Counterintelligence and Principles of Cybercrime ( https://www.onlineuticacollege.com/programs/masters-cybersecurity.asp ). Below is the executive summary of one such paper by Rebecca J. Rohan. The actual paper can be found at the link on the bottom of this page. I believe it to be very timely and an extremely interesting read.Social networking is discussed along with applications of social networking by criminals, the United States, foreign governments, law enforcement, and employers. Once applications of social networking are presented, relationships will be drawn between social networking applications and CI methods including deception and counterintelligence operations. Legal, ethical, and privacy issues surrounding the use of social networking will be presented. With the understanding of social networking applications, CI methods, and various issues, protective measures for both individuals and organizations will be discussed. Discussion of how social networking issues and the intelligence life cycle will be presented. Suggestions for how individuals, organizations, and intelligence analysts can identify and remediate issues in using social networking will be noted. Understanding the importance of social networking and its related issues will better prepare individuals, organizations, and intelligence agencies to employ it wisely. To download and view this paper – https://www.treadstone71.com/whitepapers/SocialNetworking_Counterintelligence_CyberCounterintelligence_Rebecca_Rohan.pdf Related content opinion The Sandbox - RSA Conference 2014 - San Francisco By Jeff Bardin Feb 24, 2014 3 mins Technology Industry IT Leadership opinion NY Times Story on Snowden Way Off the Mark Snowden story worthless - Basic IT protocols ignored - By Jeff Bardin Jul 05, 2013 2 mins Data and Information Security Network Security opinion Maskirovka Tactical, Operational, Strategic Deception "The Op is in Motion" By Jeff Bardin Apr 29, 2013 4 mins Physical Security IT Leadership opinion Is this gun smoking? Certified Unethical Training http://attrition.org/errata/charlatan/ec-council/eccouncil_emails.html By Jeff Bardin Mar 15, 2013 14 mins Social Engineering IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe