Page 1 of 2 12 LastLast
Results 1 to 20 of 23

Thread: Social Network Analysis (catch all)

  1. #1
    Council Member
    Join Date
    Apr 2007
    Location
    Kansas
    Posts
    21

    Default Social Networking Analysis and Homeland Security

    Moderator at work: a separate thread Social Networking Analysis and Homeland Security was merged here today.

    Cross-posted from my Posterous blog:

    Social Networking Analysis & #crowdsourcing. How can #web20 tools assist in fighting terrorism? Thesis at @usacgsc


    Can social networking assist analysts fight terrorism?

    A U.S. Army Major at the Command and General Staff College (CGSC), participating in the Master of Military Art and Science (MMAS) degree program, poses that as the primary research question in the draft prospectus for his thesis.

    The thesis - set within the focused program of Homeland Security Studies - proposes the following problem statement and research questions:

    Problem Statement

    Too much information frequently over-burdens analysts when identifying potentially dangerous activities. According to the 9/11 Commission Report, many of the 9/11 terrorists operating on U.S. soil possessed not only linkages to terrorist organizations in other countries, but also to each other. A great deal of the information that associated several of the involved parties was publicly available in unclassified forums.

    Primary Research Question

    * Can social networking assist analysts fight terrorism?

    Secondary Research Questions

    * What was the publicly available data on the 9/11 terrorists prior to the attack?
    * How does social networking create linkages?
    * How do U.S. analysts normally process Open Source Intelligence (OSINT)?

    Crowdsourcing a Thesis

    As the Chair of his MMAS Committee, I suggested asking those questions of the Web 2.0 community. Following David Meerman Scott's (@dmscott) example, where he incorporated his blog articles and user comments into the latest version of The New Rules of Marketing & PR, perhaps the research could be furthered through crowdsourcing.

    Discussion Questions

    Any issues with the proposed problem statement or research questions?

    Recently Secretary Napolitano and DHS made the news when announcing the extension of the "If You See Something, Say Something" Campaign to Walmart Stores Across the Nation.

    Does the analysis as proposed by this thesis merely extend that concept of "help[ing] the American public play an active role in ensuring the safety and security of our nation" from the physical domain to the virtual one?
    Last edited by davidbfpo; 01-14-2016 at 12:00 PM. Reason: add note

  2. #2
    Registered User
    Join Date
    Dec 2010
    Posts
    1

    Default The Boat Already Left

    I believe the topic of discussion has already been answered. The intelligence community is well aware of the benefits of mining the data provided by terrorists utilizing social media.

    I would hope the foundation for this thesis would be focused on how the current established forms of surveillance and intelligence gathering could be tied to the new forms of media dissemination. This would leverage the old and new technologies.

    Note: The NDU held a fantastic one day seminar on Social Media which included an overview of anti-terrorism activities.
    http://www.ndu.edu/iCollege/social/index.htm Which has an agenda only and is summarised on:http://govwin.com/elliotsv_blog/even...e-social/86857

    All the best,
    Ray Wulff
    Riva, Maryland
    Last edited by davidbfpo; 01-15-2011 at 12:18 PM. Reason: Second link added.

  3. #3
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default A few pointers

    I would recommend your student tries the Search feature on SWC and views some of the more obvious threads: Intelligence, Law Enforcement etc. There is a thread on social networking already:http://council.smallwarsjournal.com/...ead.php?t=9512

    Have a look at David Omand's book 'Securing the State', which attempts to think aloud about the issues and he has been advocating greater use of personal data, he calls it 'protected information' IIRC:http://www.amazon.co.uk/Securing-Sta.../dp/1849040788

    There are immense issues raised in the thesis, not just the I.T. aspects which are seemingly being "sold" to us as a "golden bullet" by many vested interests. One European academic project has tried to grapple with the issues of Detection Technologies, Counter-Terrorism Ethics, and Human Rights. Their website is:http://www.detecter.bham.ac.uk/

    Two other websites that IIRC feature thoughts on the themes are:http://icsr.info/blog and http://raffaellopantucci.com/tag/terrorism/

    What the proposal avoids IMHO are the arguments over whether an active public can help in CT, as seen in several threads / posts or whether new technology - the virtual domain - provides enough help?

    Somewhere there is a public comment on a German CT scheme that using data analysis provided a host probable suspects, not one when investigated was a suspect.
    davidbfpo

  4. #4
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default Terrorist who dreamed of Judgment Day on Facebook

    Referring to the dead terrorist in Sweden, another illustration of the speed of modern news media, I assume their own work:
    The suicide bomber who tried to cause carnage in Stockholm followed a series of fundamentalist Islamic websites including one preparing for the Day of Judgment.
    Link:http://www.telegraph.co.uk/news/ukne...-Facebook.html
    davidbfpo

  5. #5
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default Stockholm bomber on Facebook

    Hat tip to Jihadica for their excellent work on the Stockholm bombing and for this thread the link to Internet Haganah's work:http://internet-haganah.com/harchives/007103.html
    davidbfpo

  6. #6
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default Data Mining by DHS

    This article refers to data mining social networking sites to identify the 'hidden' threat and the more conventional post-arrest work:http://www.washingtonpost.com/wp-dyn...l?hpid=topnews
    davidbfpo

  7. #7
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    Social networking can be a double-edged sword (or a source of disinformation, if you're slick)

    The IDF has stepped up its war on Facebook, warning officers throughout the military that the social network site could be used by the country’s enemies to glean classified information.

    In a letter sent recently to all commanders in the army from the Operations Directorate, officers were urged to inform their subordinates about the risks that exist on websites such as Facebook.

    The letter was sent out following the online publication of a list of officers and soldiers featuring their photographs, names, addresses and other personal details under the title “Israeli War Criminals” for their actions during Operation Cast Lead in the Gaza Strip two years ago.

    According to the Operations Directorate, most of the information on the list was authentic and came from two sources – civilian databases such as phonebooks and social network sites such as Facebook.
    http://www.jpost.com/Defense/Article.aspx?id=201058
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  8. #8
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    If you're talking you are leaking information. You can have a completely unclassified innocuous conversation and leak classified information all the time. Utilizing a variety of analysis techniques and the Internet items that are part of public affairs can be used to gather information. What ship is sent to see, who got promoted, and other details leak substantial details about operations. Since the Internet allows for a deeper dive into repositories of data then was ever available before you can construct substantial dossiers of seemingly disjointed information that then can mean something. I talk about the principles in detail here.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  9. #9
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default Two viewpoints

    Hat tip to JIOX linking to this blog article 'How 'Open-Source Intelligence' Sculpts Targeted Attacks':http://www.internetevolution.com/aut...&doc_id=202619

    Which commended this:
    It was an eye opener, describing how various online applications can be used to data mine personal information and turn it into OSINT.
    The presentation is a video of a session, nearly an hour and is called 'Using Social Networks To Profile, Find and 0wn Your Victims':http://www.irongeek.com/i.php?page=v...Your%20Victims
    davidbfpo

  10. #10
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default Two viewpoints

    A satirical Onion segment 'CIA's 'Facebook' Program Dramatically Cut Agency's Costs' and an Iranian commentary:http://www.enduringamerica.com/home/...ernment-c.html

    There are some good points within.
    davidbfpo

  11. #11
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    In the midst of what officials call an "appalling" and "alarming spike" in attacks on law enforcement around the country, officials are warning the success of sites such as Facebook and Twitter has made police even more vulnerable.
    Read more: http://www.foxnews.com/scitech/2011/...#ixzz1M34hnQyM
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  12. #12
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default Tracking key terror suspects

    A BBC commentary on:
    ...Technology is the only thing that can connect all these dots..
    Link:http://www.bbc.co.uk/news/uk-13366706

    Caveat: catalyst for the comment being OBL's tracing and I remain unconvinced of the media reporting.
    davidbfpo

  13. #13
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096
    Last edited by AdamG; 05-18-2011 at 03:34 AM.
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  14. #14
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    I saw a tool by a company called Constrat today. Was very interesting set of tools for social network analysis. I'm not sure about the native/us born gathering of data, but seemed to be a workable tool like I2's.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  15. #15
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    Quote Originally Posted by AdamG View Post
    Golly, looks like the SWJ Blog discovered this link.

    *

    Meanwhile, Marc Zuckerberg gets in touch with his inner Blofeld.

    Facebook’s managers are deploying a new software upgrade that will dismantle myriad groups of like-minded political activists unless they get a special software-key from the company.

    But Facebook manager are providing very limited information about which groups are being favored with the new key, prompting some activists to complain about possible political favoritism among Facebook managers, and many other activists to experiment with techniques and tricks to get the needed upgrade-key.

    “Who is being given the upgrade?” asked Pamela Geller, the New York organizer of a 15,000-member group opposed to Islamist political groups. Without the special key, groups lose access to their members, she said. “I’ve seen people really freaking out.”
    The activists’ worries about Facebook’s possible political tilt are fortified by the political activities of its founders and employees. The company’s employees donated heavily to the Obama campaign in 2008, just as did the employees of Google and Microsoft. Facebook-founder Chris Hughes workers as head of the online-organizing campaign for the Obama campaign, while company chief Marc Zuckerberg has declared himself to be an Obama supporter.
    http://news.yahoo.com/s/dailycaller/...NlYm9va3VwZ3I-
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  16. #16
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    Quick link on de-anonymizing social networks (pdf warning!).
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  17. #17
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default CIA secretly monitors world on Twitter, Facebook

    Hat tip to Enduring America's review of the press.

    Starts with:
    In an anonymous industrial park in Virginia, in an unassuming brick building, the CIA is following tweets — up to 5 million a day.

    At the agency's Open Source Center, a team known affectionately as the "vengeful librarians" also pores over Facebook, newspapers, TV news channels, local radio stations, Internet chat rooms — anything overseas that anyone can access and contribute to openly.
    Ends with a reference to events in Bangkok:
    Ultimately, some two-thirds of the reports coming out of the embassy being sent back to all branches of government in Washington came from the CIA's open source analysis throughout the crisis.
    Link:http://www.msnbc.msn.com/id/45164661.../#.TrV-pfTz2sp
    davidbfpo

  18. #18
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default Using of social media intelligence: a report

    Last month the London, UK radical think tank, Demos, published on-line a report '#Intelligence' on the use of social media intelligence and I found it today after an advert landed for a discussion forum next month at the Frontline Club, London.

    From the summary:
    This paper is the first effort to examine the ethical, legal and operational challenges involved in using social media for intelligence and insight purposes. It argues that social media should become a permanent part of the intelligence framework but that it must be based on a publicly argued, legal footing, with clarity and transparency over use, storage, purpose, regulation and accountability.
    On my first reading it is a good effort, notably on the ethics involved, but is marred by an over-confidence in existing regulatory and oversight mechanisms in the UK.

    Link to summary:http://www.demos.co.uk/publications/intelligence

    The report itself:http://www.demos.co.uk/files/_Intell...pdf?1335197327
    davidbfpo

  19. #19
    Registered User JohnBertetto's Avatar
    Join Date
    Dec 2012
    Posts
    6

    Default Social Network Analysis (catch all)

    Orca can figure out the likely affiliations of individuals who will not admit to being members of any specific gang, as well as the sub-structure of gangs – the gang ecosystem – and the identities of those who tend to dictate the behaviour of others.
    http://www.technologyreview.com/view...g-violence-in/

    http://www.bbc.com/future/story/2013...orks-with-data

    http://gizmodo.com/the-armys-insurge...-use-695363334

    http://arxiv.org/abs/1306.6834

    Moderator's Note

    For additional sources and comments see the threads COIN comes home to assist policing (in Law Enforcement arena) and Social Media: the widest impact of (in this arena). (Ends.)
    Last edited by davidbfpo; 07-19-2013 at 08:47 AM. Reason: add Mod's Note

  20. #20
    Registered User JohnBertetto's Avatar
    Join Date
    Dec 2012
    Posts
    6

    Default

    I will add two things to the Moderator's comments:

    First, this is not just "COIN in policing." The in-depth use of SNA as a counternetwork tool grew in COIN, but to call this effort - as the articles here do - the adaptation of COIN in policing is a bit misleading. SNA is SNA, be the "SN" an insurgent group, a terror cell, a police department, of the management of a Wal-mart. Additionally, much of the analysis here is unused in COIN at this time (new research).

    Second, SNA is not Social media. You can conduct an SNA of social media users, but you do not need social media to conduct SNA. The two terms do not mean the same thing.

Similar Threads

  1. Roadside Bombs & IEDs (catch all)
    By SWJED in forum Intelligence
    Replies: 290
    Last Post: 01-13-2018, 01:59 AM
  2. The Rules - Engaging HVTs & OBL
    By jmm99 in forum Military - Other
    Replies: 166
    Last Post: 07-28-2013, 06:41 PM
  3. Social Networking Analysis and Homeland Security
    By BobKing in forum Intelligence
    Replies: 17
    Last Post: 05-17-2012, 07:51 PM
  4. World Bank - Country Social Analysis
    By Jedburgh in forum Social Sciences, Moral, and Religious
    Replies: 0
    Last Post: 09-12-2007, 03:47 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •