Literacies for Surveillance: Social Network Sites and Background Investigations
Autor(a) principal: | |
---|---|
Data de Publicação: | 2015 |
Tipo de documento: | Artigo |
Idioma: | eng |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | https://doi.org/10.17645/mac.v3i2.266 |
Resumo: | In September 2013, civilian contractor Aaron Alexis entered the Washington Navy Yard and murdered twelve people before being fatally shot by police. This incident, together with an incident three months earlier involving Edward Snowden, caused the U.S. government to critically examine their background investigation (BI) process; because both Snowden and Alexis had supposedly slipped through the cracks of their investigations, there must be some flaw in the BI procedure. The U.S. Committee on Oversight and Reform concluded that rules forbidding “background checkers from looking at the Internet or social media when performing checks” was one of the main factors contributing to defective BIs (Report, 2014). Since the report’s release, the Director of National Intelligence has been debating and trialing whether information from the Internet should be used to form a data double for BIs (Kopp, 2014; Rockwell, 2014). Using this conversation as a discussion catalyst, I argue that due to the nature of the data double, if the United States were to adopt the use of social networking sites (SNSs) for security clearance purposes, neglecting to take into account basic principles of SNSs into the process of BIs may lead to misinformation and unfavorable adjudication. Ultimately, being literate about the social practices involved in SNSs and surveillance would benefit not only investigators, but anyone, including academics, looking at individuals in online spaces. |
id |
RCAP_eb51ef0f43d6e77824aff4c88c32b793 |
---|---|
oai_identifier_str |
oai:ojs.cogitatiopress.com:article/266 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
Literacies for Surveillance: Social Network Sites and Background Investigationsbackground investigations; data double; literacies; sorting; surveillanceIn September 2013, civilian contractor Aaron Alexis entered the Washington Navy Yard and murdered twelve people before being fatally shot by police. This incident, together with an incident three months earlier involving Edward Snowden, caused the U.S. government to critically examine their background investigation (BI) process; because both Snowden and Alexis had supposedly slipped through the cracks of their investigations, there must be some flaw in the BI procedure. The U.S. Committee on Oversight and Reform concluded that rules forbidding “background checkers from looking at the Internet or social media when performing checks” was one of the main factors contributing to defective BIs (Report, 2014). Since the report’s release, the Director of National Intelligence has been debating and trialing whether information from the Internet should be used to form a data double for BIs (Kopp, 2014; Rockwell, 2014). Using this conversation as a discussion catalyst, I argue that due to the nature of the data double, if the United States were to adopt the use of social networking sites (SNSs) for security clearance purposes, neglecting to take into account basic principles of SNSs into the process of BIs may lead to misinformation and unfavorable adjudication. Ultimately, being literate about the social practices involved in SNSs and surveillance would benefit not only investigators, but anyone, including academics, looking at individuals in online spaces.Cogitatio2015-09-30info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttps://doi.org/10.17645/mac.v3i2.266oai:ojs.cogitatiopress.com:article/266Media and Communication; Vol 3, No 2 (2015): Surveillance: Critical Analysis and Current Challenges (Part I); 88-972183-2439reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAPenghttps://www.cogitatiopress.com/mediaandcommunication/article/view/266https://doi.org/10.17645/mac.v3i2.266https://www.cogitatiopress.com/mediaandcommunication/article/view/266/266Copyright (c) 2015 Sarah Jackson Younghttp://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessJackson Young, Sarah2022-12-20T10:57:59Zoai:ojs.cogitatiopress.com:article/266Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T16:20:42.998516Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
Literacies for Surveillance: Social Network Sites and Background Investigations |
title |
Literacies for Surveillance: Social Network Sites and Background Investigations |
spellingShingle |
Literacies for Surveillance: Social Network Sites and Background Investigations Jackson Young, Sarah background investigations; data double; literacies; sorting; surveillance |
title_short |
Literacies for Surveillance: Social Network Sites and Background Investigations |
title_full |
Literacies for Surveillance: Social Network Sites and Background Investigations |
title_fullStr |
Literacies for Surveillance: Social Network Sites and Background Investigations |
title_full_unstemmed |
Literacies for Surveillance: Social Network Sites and Background Investigations |
title_sort |
Literacies for Surveillance: Social Network Sites and Background Investigations |
author |
Jackson Young, Sarah |
author_facet |
Jackson Young, Sarah |
author_role |
author |
dc.contributor.author.fl_str_mv |
Jackson Young, Sarah |
dc.subject.por.fl_str_mv |
background investigations; data double; literacies; sorting; surveillance |
topic |
background investigations; data double; literacies; sorting; surveillance |
description |
In September 2013, civilian contractor Aaron Alexis entered the Washington Navy Yard and murdered twelve people before being fatally shot by police. This incident, together with an incident three months earlier involving Edward Snowden, caused the U.S. government to critically examine their background investigation (BI) process; because both Snowden and Alexis had supposedly slipped through the cracks of their investigations, there must be some flaw in the BI procedure. The U.S. Committee on Oversight and Reform concluded that rules forbidding “background checkers from looking at the Internet or social media when performing checks” was one of the main factors contributing to defective BIs (Report, 2014). Since the report’s release, the Director of National Intelligence has been debating and trialing whether information from the Internet should be used to form a data double for BIs (Kopp, 2014; Rockwell, 2014). Using this conversation as a discussion catalyst, I argue that due to the nature of the data double, if the United States were to adopt the use of social networking sites (SNSs) for security clearance purposes, neglecting to take into account basic principles of SNSs into the process of BIs may lead to misinformation and unfavorable adjudication. Ultimately, being literate about the social practices involved in SNSs and surveillance would benefit not only investigators, but anyone, including academics, looking at individuals in online spaces. |
publishDate |
2015 |
dc.date.none.fl_str_mv |
2015-09-30 |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
https://doi.org/10.17645/mac.v3i2.266 oai:ojs.cogitatiopress.com:article/266 |
url |
https://doi.org/10.17645/mac.v3i2.266 |
identifier_str_mv |
oai:ojs.cogitatiopress.com:article/266 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
https://www.cogitatiopress.com/mediaandcommunication/article/view/266 https://doi.org/10.17645/mac.v3i2.266 https://www.cogitatiopress.com/mediaandcommunication/article/view/266/266 |
dc.rights.driver.fl_str_mv |
Copyright (c) 2015 Sarah Jackson Young http://creativecommons.org/licenses/by/4.0 info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Copyright (c) 2015 Sarah Jackson Young http://creativecommons.org/licenses/by/4.0 |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Cogitatio |
publisher.none.fl_str_mv |
Cogitatio |
dc.source.none.fl_str_mv |
Media and Communication; Vol 3, No 2 (2015): Surveillance: Critical Analysis and Current Challenges (Part I); 88-97 2183-2439 reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799130655154503680 |