Social media and intelligence-led surveillance

July 2019 Editor's Choice, Integrated Solutions, Security Services & Risk Management

Social media has become a major feature of most people’s lives in the last few years. Names of the major social media networks have become commonplace in conversation and many people are users of more than one of these networks.

While the classification of different social networks varies, it includes social networks such as Facebook and Linked In, microblogging types such as Twitter and Tumblr, networks for exchange or sharing of media like Youtube, Snapchat, Instagram, Flickr and MySpace, and communication types such as WhatsApp, QQ, Line and WeChat.

In addition, there are a number of speciality networks and a range of deliberately anonymous social networks. Many of these sites have users in the hundreds of millions a month. As social media, their penetration is across all levels of sociality, and across all groups including church groups, football clubs, the local tea society, criminals, extremists, and disturbed individuals.

These social media groups are seen to provide functions that go to the essentials of a working (or at times dysfunctional society), although this used to be at the level of a local village and now has scope for international interaction. “As users engage with these electronic services, that they create highly interactive platforms through which individuals, communities, and organisations can share, co-create, discuss, participate and modify user-generated content or pre-made content posted online” (Wikipedia).

Indeed, as a response to community issues, including disaster situations, they can be invaluable. Social networks of all types are therefore seen to provide an important social function of contact, communications, being in touch, and sense of belonging. In search of recognition or acceptance, or possibly even notoriety, people express their views, feelings, values, experiences, likes and dislikes, ambition, and at times, prejudices. At times naїvely, at times deliberately, and at times, by accident, such contact may reach beyond people close to them to a much wider audience.

Your unofficial résumé

Ultimately, whether they are aware of it, much of the social media content becomes available for the world to search and see, and for people to make use of it whether the originator likes it or not, or intends for it to happen or not.

Companies have for some time been using social media like Facebook as part of an employment screening process, and this has expanded to professional screening facilities to screen applicants for positions by looking at their social media history. Inappropriate use of media, or expression of views has also lost people their jobs, careers and contracts due to ill-considered or downright prejudicial statements being expressed that are exposed to the whole world on places like Twitter.

However, given that criminals and terrorists are a part of this social network, we have also seen active steps to use social networking to investigate, come close to, and gather information on criminal actions. Use of undercover identities has been used in cases to come become close to criminals through a process of infiltrating and befriending Facebook networks and luring criminals out, including one I know where the investigator portrayed himself as a female model in order to get details of a murder suspect who wanted to meet ‘her’. In another instance, a suspect in a syndicate was confirmed when his Facebook page showed a picture of himself lying on a bed scattered with banknotes, and I’m sure not the first time this has happened on Facebook.

A range of options to monitor

In the US and elsewhere around the world, there is a trend to large companies and certainly government doing scanning on social media for a range of information. This can be related to public relations, marketing, product feedback, and even monitoring of possible movements or clustering of people for emergencies or disasters, major sporting occasions, launches, signing events for prominent personalities, and political movement rallies or meetings.

These may all require some kind of response by organisations to facilitate, secure, or police such organised or even spontaneous events. In addition, potential threats including those of protest, violence, or general social disruption may be anticipated, as well as threats to life including shootings, terrorism and things like bomb threats. The use of social media by organisations or individuals posing a danger to the public is increasingly becoming an aspect of the risk and threat analysis for companies and in some cases has become a standardised form of surveillance.

Social monitoring has therefore moved into the intelligence and risk space as a direct source of information to broader surveillance, including for CCTV applications and physical security on the ground.

Live monitoring

Recently I’ve seen an example of a dedicated social media monitoring room which is used for a variety of purposes include public relations, service delivery feedback, including customer opinions, and social event monitoring. However, built into this process is also a threat detection and intelligence capacity for the safeguarding of customers, visitors, prominent people and critical infrastructure.

It is one of the few times that I’ve seen people on their cellphones in a control room really working, as part of their answering of queries or provision of information. These kinds of facilitates monitor through the detection of words or terms, or possibly users and employ a number of products in order to do this. Being able to search for other characteristics such as gender or other identifiers may be available in certain packages.

This does come with responsibilities though. Given the international outcry about Cambridge Analytica and its data harvesting of Facebook information in order to psychologically profile voters during the 2016 US election, it shows that any processing of big data can be controversial in terms of how it is gathered and what is done with it. However, a search for ‘social media monitoring’ or using the term ‘listening’ will generate a number of products that can be used for general monitoring.

Key factors for such social media monitoring products include being able to simultaneously listen or track multiple sources, having a concise dashboard or control screen/s to do this, to be able to do so in real time, to have dynamic filters including the ability to define specific types of sources and types of media, to track influencers and sources, quantifying positive or negative nature of comments, and to respond to messages where necessary.

Some products provide pattern analysis and even graphical illustrations such as heat maps, which highlight locations or frequency of terms or users. The ability to analyse changes over time may also be a component that one evaluates as part of your intelligence gathering. To facilitate follow-up action, having a system or access to work out where the messages are coming from, and ideally who from may be possible under some circumstances. This is particularly the case where messages may involve criminal or even terrorist action and police or national intelligence may be involved.

Social media monitoring control rooms

Individualised, or on demand checking of social media at this stage is relatively common. We are more likely to see dedicated social media control rooms in the future though, based on what I have seen recently.

Social media monitoring involves getting access to extremely powerful data. The techniques and tools may be relatively available but the benefits are potentially very high in terms of intelligence information. By contributing to an intelligence-led surveillance strategy, this could lead to much higher success in stopping dangerous events or allowing for the detection and apprehension of potential suspects. Activation during strikes, emergencies and other events may also provide insights and a response method to quickly provide relevant and request driven information.

It also involves skilled usage including the nature of searches, and considered interpretation and evaluation in context. At the same time, to get on the wrong side of social media carries its own risks. Responsible usage and careful handling of the consequences is an important factor in any such use.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 11 787 7811 or [email protected]


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Security risk and the sum of small things
Leaderware Editor's Choice
Dr Craig Donald advises that the small things we often write off as unimportant can quickly scale to become serious threats to security and safety.

Sustainability, trust and predictability
Technews Publishing Bosch Building Technologies Conferences & Events CCTV, Surveillance & Remote Monitoring News Integrated Solutions
The future for Bosch Building Solutions is focused on predictive solutions based on sustainability and trust in an AIoT world of cloud services.

Specialised surveillance and communications
Technews Publishing Editor's Choice News Integrated Solutions Residential Estate (Industry)
Hi-Tech Security Solutions spoke to Arcanum Africa’s Peter Stolwerk and Aaron van Schaik to find out a bit more about the company and the unique products it is bringing to the local market.

From Hill Street Blues, to Hillbrow, to managing risk for BMW
Technews Publishing Editor's Choice News Security Services & Risk Management
Jane-Eleanor Morrison’s success story starts from growing up in the stressful pre-democracy times in KZN, moves through a successful career in SAPS. to BMW South Africa where she is now the risk control manager.

Locally designed lock designed to stay locked
Editor's Choice
The new Blade Lock makes it close to impossible to break a lock by conventional means; combined with the Smart Gate, your security behind the door is certain.

Water deluge fire suppression system
FS Systems Editor's Choice Fire & Safety Mining (Industry) Products
The FS Group custom-designed and installed an electronically actuated water deluge fire suppression system for an underground explosives magazine, ensuring both the safety of miners and operations, as well as regulatory compliance.

Hard times, increased crime
Technews Publishing Security Services & Risk Management Integrated Solutions IT infrastructure
Hi-Tech Security Solutions spoke to Mezuzah Security Services to find out what is happening in the real world, and how security companies are dealing with the added pressure inherent to the South African market.

A cyber security mesh platform underpins an interconnected digital world
Editor's Choice
In a world of interconnected people, devices, networks and applications, a cybersecurity mesh platform is the answer to mitigating ever-present cyber risks.

Look again at security automation
Editor's Choice
Hila Meller, BT Security, global head of sales, shares BT’s learnings on the top five things to consider for your security automation journey.

South Africa adopts ISO standard to guide use of social media in emergencies
Editor's Choice
The South African Bureau of Standards (SABS), through its technical committee, has adopted the ISO 22329 standard that provides guidance on the use of social media during an emergency or crisis.