SMALL WARS COUNCIL
Go Back   Small Wars Council > Military Art & Science Applied > Intelligence

Intelligence What do we know, need to know, and how do we get there?

Reply
 
Thread Tools Display Modes
Old 12-09-2010   #1
BobKing
Council Member
 
Join Date: Apr 2007
Location: Kansas
Posts: 21
Default Social Networking Analysis and Homeland Security

Moderator at work: a separate thread Social Networking Analysis and Homeland Security was merged here today.

Cross-posted from my Posterous blog:

Social Networking Analysis & #crowdsourcing. How can #web20 tools assist in fighting terrorism? Thesis at @usacgsc


Can social networking assist analysts fight terrorism?

A U.S. Army Major at the Command and General Staff College (CGSC), participating in the Master of Military Art and Science (MMAS) degree program, poses that as the primary research question in the draft prospectus for his thesis.

The thesis - set within the focused program of Homeland Security Studies - proposes the following problem statement and research questions:

Problem Statement

Too much information frequently over-burdens analysts when identifying potentially dangerous activities. According to the 9/11 Commission Report, many of the 9/11 terrorists operating on U.S. soil possessed not only linkages to terrorist organizations in other countries, but also to each other. A great deal of the information that associated several of the involved parties was publicly available in unclassified forums.

Primary Research Question

* Can social networking assist analysts fight terrorism?

Secondary Research Questions

* What was the publicly available data on the 9/11 terrorists prior to the attack?
* How does social networking create linkages?
* How do U.S. analysts normally process Open Source Intelligence (OSINT)?

Crowdsourcing a Thesis

As the Chair of his MMAS Committee, I suggested asking those questions of the Web 2.0 community. Following David Meerman Scott's (@dmscott) example, where he incorporated his blog articles and user comments into the latest version of The New Rules of Marketing & PR, perhaps the research could be furthered through crowdsourcing.

Discussion Questions

Any issues with the proposed problem statement or research questions?

Recently Secretary Napolitano and DHS made the news when announcing the extension of the "If You See Something, Say Something" Campaign to Walmart Stores Across the Nation.

Does the analysis as proposed by this thesis merely extend that concept of "help[ing] the American public play an active role in ensuring the safety and security of our nation" from the physical domain to the virtual one?

Last edited by davidbfpo; 01-14-2016 at 11:00 AM. Reason: add note
BobKing is offline   Reply With Quote
Old 12-09-2010   #2
Ray Wulff
Registered User
 
Join Date: Dec 2010
Posts: 1
Default The Boat Already Left

I believe the topic of discussion has already been answered. The intelligence community is well aware of the benefits of mining the data provided by terrorists utilizing social media.

I would hope the foundation for this thesis would be focused on how the current established forms of surveillance and intelligence gathering could be tied to the new forms of media dissemination. This would leverage the old and new technologies.

Note: The NDU held a fantastic one day seminar on Social Media which included an overview of anti-terrorism activities.
http://www.ndu.edu/iCollege/social/index.htm Which has an agenda only and is summarised on:http://govwin.com/elliotsv_blog/even...e-social/86857

All the best,
Ray Wulff
Riva, Maryland

Last edited by davidbfpo; 01-15-2011 at 11:18 AM. Reason: Second link added.
Ray Wulff is offline   Reply With Quote
Old 12-10-2010   #3
davidbfpo
Council Member
 
davidbfpo's Avatar
 
Join Date: Mar 2006
Location: UK
Posts: 10,645
Default A few pointers

I would recommend your student tries the Search feature on SWC and views some of the more obvious threads: Intelligence, Law Enforcement etc. There is a thread on social networking already:http://council.smallwarsjournal.com/...ead.php?t=9512

Have a look at David Omand's book 'Securing the State', which attempts to think aloud about the issues and he has been advocating greater use of personal data, he calls it 'protected information' IIRC:http://www.amazon.co.uk/Securing-Sta.../dp/1849040788

There are immense issues raised in the thesis, not just the I.T. aspects which are seemingly being "sold" to us as a "golden bullet" by many vested interests. One European academic project has tried to grapple with the issues of Detection Technologies, Counter-Terrorism Ethics, and Human Rights. Their website is:http://www.detecter.bham.ac.uk/

Two other websites that IIRC feature thoughts on the themes are:http://icsr.info/blog and http://raffaellopantucci.com/tag/terrorism/

What the proposal avoids IMHO are the arguments over whether an active public can help in CT, as seen in several threads / posts or whether new technology - the virtual domain - provides enough help?

Somewhere there is a public comment on a German CT scheme that using data analysis provided a host probable suspects, not one when investigated was a suspect.
__________________
davidbfpo
davidbfpo is offline   Reply With Quote
Old 12-13-2010   #4
davidbfpo
Council Member
 
davidbfpo's Avatar
 
Join Date: Mar 2006
Location: UK
Posts: 10,645
Default Terrorist who dreamed of Judgment Day on Facebook

Referring to the dead terrorist in Sweden, another illustration of the speed of modern news media, I assume their own work:
Quote:
The suicide bomber who tried to cause carnage in Stockholm followed a series of fundamentalist Islamic websites including one preparing for the Day of Judgment.
Link:http://www.telegraph.co.uk/news/ukne...-Facebook.html
__________________
davidbfpo
davidbfpo is offline   Reply With Quote
Old 12-14-2010   #5
davidbfpo
Council Member
 
davidbfpo's Avatar
 
Join Date: Mar 2006
Location: UK
Posts: 10,645
Default Stockholm bomber on Facebook

Hat tip to Jihadica for their excellent work on the Stockholm bombing and for this thread the link to Internet Haganah's work:http://internet-haganah.com/harchives/007103.html
__________________
davidbfpo
davidbfpo is offline   Reply With Quote
Old 12-29-2010   #6
davidbfpo
Council Member
 
davidbfpo's Avatar
 
Join Date: Mar 2006
Location: UK
Posts: 10,645
Default Data Mining by DHS

This article refers to data mining social networking sites to identify the 'hidden' threat and the more conventional post-arrest work:http://www.washingtonpost.com/wp-dyn...l?hpid=topnews
__________________
davidbfpo
davidbfpo is offline   Reply With Quote
Old 12-29-2010   #7
AdamG
Council Member
 
AdamG's Avatar
 
Join Date: Dec 2005
Location: Hiding from the Dreaded Burrito Gang
Posts: 1,964
Default

Social networking can be a double-edged sword (or a source of disinformation, if you're slick)

Quote:
The IDF has stepped up its war on Facebook, warning officers throughout the military that the social network site could be used by the country’s enemies to glean classified information.

In a letter sent recently to all commanders in the army from the Operations Directorate, officers were urged to inform their subordinates about the risks that exist on websites such as Facebook.

The letter was sent out following the online publication of a list of officers and soldiers featuring their photographs, names, addresses and other personal details under the title “Israeli War Criminals” for their actions during Operation Cast Lead in the Gaza Strip two years ago.

According to the Operations Directorate, most of the information on the list was authentic and came from two sources – civilian databases such as phonebooks and social network sites such as Facebook.
http://www.jpost.com/Defense/Article.aspx?id=201058
__________________
A scrimmage in a Border Station
A canter down some dark defile
Two thousand pounds of education
Drops to a ten-rupee jezail


http://i.imgur.com/IPT1uLH.jpg
AdamG is offline   Reply With Quote
Old 12-29-2010   #8
selil
i pwnd ur ooda loop
 
selil's Avatar
 
Join Date: Sep 2006
Location: Belly of the beast
Posts: 2,112
Default

If you're talking you are leaking information. You can have a completely unclassified innocuous conversation and leak classified information all the time. Utilizing a variety of analysis techniques and the Internet items that are part of public affairs can be used to gather information. What ship is sent to see, who got promoted, and other details leak substantial details about operations. Since the Internet allows for a deeper dive into repositories of data then was ever available before you can construct substantial dossiers of seemingly disjointed information that then can mean something. I talk about the principles in detail here.
__________________
Sam Liles
Selil Blog
Don't forget to duck Secret Squirrel
The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.
selil is offline   Reply With Quote
Old 01-15-2011   #9
davidbfpo
Council Member
 
davidbfpo's Avatar
 
Join Date: Mar 2006
Location: UK
Posts: 10,645
Default Two viewpoints

Hat tip to JIOX linking to this blog article 'How 'Open-Source Intelligence' Sculpts Targeted Attacks':http://www.internetevolution.com/aut...&doc_id=202619

Which commended this:
Quote:
It was an eye opener, describing how various online applications can be used to data mine personal information and turn it into OSINT.
The presentation is a video of a session, nearly an hour and is called 'Using Social Networks To Profile, Find and 0wn Your Victims':http://www.irongeek.com/i.php?page=v...Your%20Victims
__________________
davidbfpo
davidbfpo is offline   Reply With Quote
Old 03-22-2011   #10
davidbfpo
Council Member
 
davidbfpo's Avatar
 
Join Date: Mar 2006
Location: UK
Posts: 10,645
Default Two viewpoints

A satirical Onion segment 'CIA's 'Facebook' Program Dramatically Cut Agency's Costs' and an Iranian commentary:http://www.enduringamerica.com/home/...ernment-c.html

There are some good points within.
__________________
davidbfpo
davidbfpo is offline   Reply With Quote
Old 05-11-2011   #11
AdamG
Council Member
 
AdamG's Avatar
 
Join Date: Dec 2005
Location: Hiding from the Dreaded Burrito Gang
Posts: 1,964
Default

Quote:
In the midst of what officials call an "appalling" and "alarming spike" in attacks on law enforcement around the country, officials are warning the success of sites such as Facebook and Twitter has made police even more vulnerable.
Read more: http://www.foxnews.com/scitech/2011/...#ixzz1M34hnQyM
__________________
A scrimmage in a Border Station
A canter down some dark defile
Two thousand pounds of education
Drops to a ten-rupee jezail


http://i.imgur.com/IPT1uLH.jpg
AdamG is offline   Reply With Quote
Old 05-13-2011   #12
davidbfpo
Council Member
 
davidbfpo's Avatar
 
Join Date: Mar 2006
Location: UK
Posts: 10,645
Default Tracking key terror suspects

A BBC commentary on:
Quote:
...Technology is the only thing that can connect all these dots..
Link:http://www.bbc.co.uk/news/uk-13366706

Caveat: catalyst for the comment being OBL's tracing and I remain unconvinced of the media reporting.
__________________
davidbfpo
davidbfpo is offline   Reply With Quote
Old 05-18-2011   #13
AdamG
Council Member
 
AdamG's Avatar
 
Join Date: Dec 2005
Location: Hiding from the Dreaded Burrito Gang
Posts: 1,964
Default

In Satura Veritas.
__________________
A scrimmage in a Border Station
A canter down some dark defile
Two thousand pounds of education
Drops to a ten-rupee jezail


http://i.imgur.com/IPT1uLH.jpg

Last edited by AdamG; 05-18-2011 at 03:34 AM.
AdamG is offline   Reply With Quote
Old 05-19-2011   #14
selil
i pwnd ur ooda loop
 
selil's Avatar
 
Join Date: Sep 2006
Location: Belly of the beast
Posts: 2,112
Default

I saw a tool by a company called Constrat today. Was very interesting set of tools for social network analysis. I'm not sure about the native/us born gathering of data, but seemed to be a workable tool like I2's.
__________________
Sam Liles
Selil Blog
Don't forget to duck Secret Squirrel
The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.
selil is offline   Reply With Quote
Old 05-24-2011   #15
AdamG
Council Member
 
AdamG's Avatar
 
Join Date: Dec 2005
Location: Hiding from the Dreaded Burrito Gang
Posts: 1,964
Default

Quote:
Originally Posted by AdamG View Post
Golly, looks like the SWJ Blog discovered this link.

*

Meanwhile, Marc Zuckerberg gets in touch with his inner Blofeld.

Quote:
Facebook’s managers are deploying a new software upgrade that will dismantle myriad groups of like-minded political activists unless they get a special software-key from the company.

But Facebook manager are providing very limited information about which groups are being favored with the new key, prompting some activists to complain about possible political favoritism among Facebook managers, and many other activists to experiment with techniques and tricks to get the needed upgrade-key.

“Who is being given the upgrade?” asked Pamela Geller, the New York organizer of a 15,000-member group opposed to Islamist political groups. Without the special key, groups lose access to their members, she said. “I’ve seen people really freaking out.”
Quote:
The activists’ worries about Facebook’s possible political tilt are fortified by the political activities of its founders and employees. The company’s employees donated heavily to the Obama campaign in 2008, just as did the employees of Google and Microsoft. Facebook-founder Chris Hughes workers as head of the online-organizing campaign for the Obama campaign, while company chief Marc Zuckerberg has declared himself to be an Obama supporter.
http://news.yahoo.com/s/dailycaller/...NlYm9va3VwZ3I-
__________________
A scrimmage in a Border Station
A canter down some dark defile
Two thousand pounds of education
Drops to a ten-rupee jezail


http://i.imgur.com/IPT1uLH.jpg
AdamG is offline   Reply With Quote
Old 05-24-2011   #16
selil
i pwnd ur ooda loop
 
selil's Avatar
 
Join Date: Sep 2006
Location: Belly of the beast
Posts: 2,112
Default

Quick link on de-anonymizing social networks (pdf warning!).
__________________
Sam Liles
Selil Blog
Don't forget to duck Secret Squirrel
The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.
selil is offline   Reply With Quote
Old 11-05-2011   #17
davidbfpo
Council Member
 
davidbfpo's Avatar
 
Join Date: Mar 2006
Location: UK
Posts: 10,645
Default CIA secretly monitors world on Twitter, Facebook

Hat tip to Enduring America's review of the press.

Starts with:
Quote:
In an anonymous industrial park in Virginia, in an unassuming brick building, the CIA is following tweets — up to 5 million a day.

At the agency's Open Source Center, a team known affectionately as the "vengeful librarians" also pores over Facebook, newspapers, TV news channels, local radio stations, Internet chat rooms — anything overseas that anyone can access and contribute to openly.
Ends with a reference to events in Bangkok:
Quote:
Ultimately, some two-thirds of the reports coming out of the embassy being sent back to all branches of government in Washington came from the CIA's open source analysis throughout the crisis.
Link:http://www.msnbc.msn.com/id/45164661.../#.TrV-pfTz2sp
__________________
davidbfpo
davidbfpo is offline   Reply With Quote
Old 05-17-2012   #18
davidbfpo
Council Member
 
davidbfpo's Avatar
 
Join Date: Mar 2006
Location: UK
Posts: 10,645
Default Using of social media intelligence: a report

Last month the London, UK radical think tank, Demos, published on-line a report '#Intelligence' on the use of social media intelligence and I found it today after an advert landed for a discussion forum next month at the Frontline Club, London.

From the summary:
Quote:
This paper is the first effort to examine the ethical, legal and operational challenges involved in using social media for intelligence and insight purposes. It argues that social media should become a permanent part of the intelligence framework but that it must be based on a publicly argued, legal footing, with clarity and transparency over use, storage, purpose, regulation and accountability.
On my first reading it is a good effort, notably on the ethics involved, but is marred by an over-confidence in existing regulatory and oversight mechanisms in the UK.

Link to summary:http://www.demos.co.uk/publications/intelligence

The report itself:http://www.demos.co.uk/files/_Intell...pdf?1335197327
__________________
davidbfpo
davidbfpo is offline   Reply With Quote
Old 07-19-2013   #19
JohnBertetto
Registered User
 
JohnBertetto's Avatar
 
Join Date: Dec 2012
Posts: 6
Default Social Network Analysis (catch all)

Quote:
Orca can figure out the likely affiliations of individuals who will not admit to being members of any specific gang, as well as the sub-structure of gangs – the gang ecosystem – and the identities of those who tend to dictate the behaviour of others.
http://www.technologyreview.com/view...g-violence-in/

http://www.bbc.com/future/story/2013...orks-with-data

http://gizmodo.com/the-armys-insurge...-use-695363334

http://arxiv.org/abs/1306.6834

Moderator's Note

For additional sources and comments see the threads COIN comes home to assist policing (in Law Enforcement arena) and Social Media: the widest impact of (in this arena). (Ends.)

Last edited by davidbfpo; 07-19-2013 at 08:47 AM. Reason: add Mod's Note
JohnBertetto is offline   Reply With Quote
Old 07-19-2013   #20
JohnBertetto
Registered User
 
JohnBertetto's Avatar
 
Join Date: Dec 2012
Posts: 6
Default

I will add two things to the Moderator's comments:

First, this is not just "COIN in policing." The in-depth use of SNA as a counternetwork tool grew in COIN, but to call this effort - as the articles here do - the adaptation of COIN in policing is a bit misleading. SNA is SNA, be the "SN" an insurgent group, a terror cell, a police department, of the management of a Wal-mart. Additionally, much of the analysis here is unused in COIN at this time (new research).

Second, SNA is not Social media. You can conduct an SNA of social media users, but you do not need social media to conduct SNA. The two terms do not mean the same thing.
JohnBertetto is offline   Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Roadside Bombs & IEDs (catch all) SWJED Intelligence 254 03-13-2016 08:54 PM
The Rules - Engaging HVTs & OBL jmm99 Military - Other 166 07-28-2013 06:41 PM
Social Networking Analysis and Homeland Security BobKing Intelligence 17 05-17-2012 07:51 PM
World Bank - Country Social Analysis Jedburgh Social Sciences, Moral, and Religious 0 09-12-2007 03:47 PM


All times are GMT. The time now is 04:00 AM.


Powered by vBulletin® Version 3.8.9. ©2000 - 2017, Jelsoft Enterprises Ltd.
Registered Users are solely responsible for their messages.
Operated by, and site design © 2005-2009, Small Wars Foundation