Social media and intelligence-led surveillance

July 2019 Editor's Choice, Integrated Solutions, Security Services & Risk Management

Social media has become a major feature of most people’s lives in the last few years. Names of the major social media networks have become commonplace in conversation and many people are users of more than one of these networks.

While the classification of different social networks varies, it includes social networks such as Facebook and Linked In, microblogging types such as Twitter and Tumblr, networks for exchange or sharing of media like Youtube, Snapchat, Instagram, Flickr and MySpace, and communication types such as WhatsApp, QQ, Line and WeChat.

In addition, there are a number of speciality networks and a range of deliberately anonymous social networks. Many of these sites have users in the hundreds of millions a month. As social media, their penetration is across all levels of sociality, and across all groups including church groups, football clubs, the local tea society, criminals, extremists, and disturbed individuals.

These social media groups are seen to provide functions that go to the essentials of a working (or at times dysfunctional society), although this used to be at the level of a local village and now has scope for international interaction. “As users engage with these electronic services, that they create highly interactive platforms through which individuals, communities, and organisations can share, co-create, discuss, participate and modify user-generated content or pre-made content posted online” (Wikipedia).

Indeed, as a response to community issues, including disaster situations, they can be invaluable. Social networks of all types are therefore seen to provide an important social function of contact, communications, being in touch, and sense of belonging. In search of recognition or acceptance, or possibly even notoriety, people express their views, feelings, values, experiences, likes and dislikes, ambition, and at times, prejudices. At times naїvely, at times deliberately, and at times, by accident, such contact may reach beyond people close to them to a much wider audience.

Your unofficial résumé

Ultimately, whether they are aware of it, much of the social media content becomes available for the world to search and see, and for people to make use of it whether the originator likes it or not, or intends for it to happen or not.

Companies have for some time been using social media like Facebook as part of an employment screening process, and this has expanded to professional screening facilities to screen applicants for positions by looking at their social media history. Inappropriate use of media, or expression of views has also lost people their jobs, careers and contracts due to ill-considered or downright prejudicial statements being expressed that are exposed to the whole world on places like Twitter.

However, given that criminals and terrorists are a part of this social network, we have also seen active steps to use social networking to investigate, come close to, and gather information on criminal actions. Use of undercover identities has been used in cases to come become close to criminals through a process of infiltrating and befriending Facebook networks and luring criminals out, including one I know where the investigator portrayed himself as a female model in order to get details of a murder suspect who wanted to meet ‘her’. In another instance, a suspect in a syndicate was confirmed when his Facebook page showed a picture of himself lying on a bed scattered with banknotes, and I’m sure not the first time this has happened on Facebook.

A range of options to monitor

In the US and elsewhere around the world, there is a trend to large companies and certainly government doing scanning on social media for a range of information. This can be related to public relations, marketing, product feedback, and even monitoring of possible movements or clustering of people for emergencies or disasters, major sporting occasions, launches, signing events for prominent personalities, and political movement rallies or meetings.

These may all require some kind of response by organisations to facilitate, secure, or police such organised or even spontaneous events. In addition, potential threats including those of protest, violence, or general social disruption may be anticipated, as well as threats to life including shootings, terrorism and things like bomb threats. The use of social media by organisations or individuals posing a danger to the public is increasingly becoming an aspect of the risk and threat analysis for companies and in some cases has become a standardised form of surveillance.

Social monitoring has therefore moved into the intelligence and risk space as a direct source of information to broader surveillance, including for CCTV applications and physical security on the ground.

Live monitoring

Recently I’ve seen an example of a dedicated social media monitoring room which is used for a variety of purposes include public relations, service delivery feedback, including customer opinions, and social event monitoring. However, built into this process is also a threat detection and intelligence capacity for the safeguarding of customers, visitors, prominent people and critical infrastructure.

It is one of the few times that I’ve seen people on their cellphones in a control room really working, as part of their answering of queries or provision of information. These kinds of facilitates monitor through the detection of words or terms, or possibly users and employ a number of products in order to do this. Being able to search for other characteristics such as gender or other identifiers may be available in certain packages.

This does come with responsibilities though. Given the international outcry about Cambridge Analytica and its data harvesting of Facebook information in order to psychologically profile voters during the 2016 US election, it shows that any processing of big data can be controversial in terms of how it is gathered and what is done with it. However, a search for ‘social media monitoring’ or using the term ‘listening’ will generate a number of products that can be used for general monitoring.

Key factors for such social media monitoring products include being able to simultaneously listen or track multiple sources, having a concise dashboard or control screen/s to do this, to be able to do so in real time, to have dynamic filters including the ability to define specific types of sources and types of media, to track influencers and sources, quantifying positive or negative nature of comments, and to respond to messages where necessary.

Some products provide pattern analysis and even graphical illustrations such as heat maps, which highlight locations or frequency of terms or users. The ability to analyse changes over time may also be a component that one evaluates as part of your intelligence gathering. To facilitate follow-up action, having a system or access to work out where the messages are coming from, and ideally who from may be possible under some circumstances. This is particularly the case where messages may involve criminal or even terrorist action and police or national intelligence may be involved.

Social media monitoring control rooms

Individualised, or on demand checking of social media at this stage is relatively common. We are more likely to see dedicated social media control rooms in the future though, based on what I have seen recently.

Social media monitoring involves getting access to extremely powerful data. The techniques and tools may be relatively available but the benefits are potentially very high in terms of intelligence information. By contributing to an intelligence-led surveillance strategy, this could lead to much higher success in stopping dangerous events or allowing for the detection and apprehension of potential suspects. Activation during strikes, emergencies and other events may also provide insights and a response method to quickly provide relevant and request driven information.

It also involves skilled usage including the nature of searches, and considered interpretation and evaluation in context. At the same time, to get on the wrong side of social media carries its own risks. Responsible usage and careful handling of the consequences is an important factor in any such use.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 11 787 7811 or [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...