Has Facebook killed the undercover cop?

Tomorrow's recruits have already been compromised

Face-recognition technology and the near-universal adoption of social networking tools by teenagers could have already made future covert police and intelligence operations difficult, if not impossible, according former Australian Federal Police commissioner Mick Keelty.

"You don't just immerse somebody into an organised crime group. It takes sometimes five, six, seven years to be able to get them into the right place where you need them to be feeding back the intelligence you need," Keelty told the Security 2011 Conference in Sydney yesterday.

Yet that undercover operative's cover could be blown by simply taking photograph and comparing it with images already posted online. Current face-recognition software can even match images taken decades apart.

Keelty is currently researching the policy implications of social networking for covert operations by  police and security agencies in his roles with Charles Sturt University and the Australian National University.

As part of his research, a survey was conducted on all of the recruits for the AFP and NSW Police, and for "some other agencies, national security agencies, as well as some other state agencies" from late 2010 through to February 2011.

"Interestingly, everybody aged 26 years or younger had uploaded their photo onto the internet," Keelty said. 85 percent were using at least one of the major social networking sites. Some 47 percent were using them daily, and another 24 percent weekly.

Of those surveyed, 85 percent had had their photos uploaded by another person, and 42 percent said it would be possible to identify their relationships with other people.

Apart from the massive trove of photographs on social networking sites like Facebook, which receives 100 million new images every day, governments and other organisations can create their own long-term image archives.

"We had anecdotal evidence given to us that outlaw motorcycle gangs were actually going to police graduation parade and taking photos, because some of you in the room would be aware that outlaw motorcycle gangs actually won a lot of tenders for contacts for major entertainment establishments around the capital cities of Australia during the last decade," Keelty said.

"How can you turn up at the Australian embassy in Jakarta and say that you're the trade commissioner for education when you've got a photograph of your graduation from [Royal Military College] Duntroon in 2006 and an unexplained absence from the world in the interim years?"

The same combination of technologies could also make things difficult for witness protection programs, and open up formerly-unidentifiable public servants to the threat of extortion and other crimes.

"Facebook, we have to say, has been difficult in trying to get them to come on board about the privacy issues associated with their network.

But there is a positive side.

"There's a gold mine of intelligence that comes out of all of this," Keelty said, pointing to the use of social networking tools by police in the Queensland floods and for identifying suspects in the UK riots.

View the Security 2011 Slideshow 

Surveillance equipment, robot guards and even a Black Hawk helicopter was seen at the Security 2011 Exhibition in Sydney this week. Neerav Bhatt went along with his camera.

Contact Stilgherrian at stil@stilgherrian.com, or follow him on Twitter at @stilgherrian.

Join the CSO newsletter!

Error: Please check your email address.

Tags Security 2011 ConferenceMick KeeltyAFPface recognitionsocial networkingnetworking toolssocial mediaFacebooknsw police

More about Australian Federal PoliceCharles Sturt UniversityCharles Sturt UniversityFacebookFederal PoliceNSW PoliceWoolworths

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Stilgherrian

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts