Social media and intelligence-led surveillance

July 2019 Editor's Choice, Integrated Solutions, Security Services & Risk Management

Social media has become a major feature of most people’s lives in the last few years. Names of the major social media networks have become commonplace in conversation and many people are users of more than one of these networks.

While the classification of different social networks varies, it includes social networks such as Facebook and Linked In, microblogging types such as Twitter and Tumblr, networks for exchange or sharing of media like Youtube, Snapchat, Instagram, Flickr and MySpace, and communication types such as WhatsApp, QQ, Line and WeChat.

In addition, there are a number of speciality networks and a range of deliberately anonymous social networks. Many of these sites have users in the hundreds of millions a month. As social media, their penetration is across all levels of sociality, and across all groups including church groups, football clubs, the local tea society, criminals, extremists, and disturbed individuals.

These social media groups are seen to provide functions that go to the essentials of a working (or at times dysfunctional society), although this used to be at the level of a local village and now has scope for international interaction. “As users engage with these electronic services, that they create highly interactive platforms through which individuals, communities, and organisations can share, co-create, discuss, participate and modify user-generated content or pre-made content posted online” (Wikipedia).

Indeed, as a response to community issues, including disaster situations, they can be invaluable. Social networks of all types are therefore seen to provide an important social function of contact, communications, being in touch, and sense of belonging. In search of recognition or acceptance, or possibly even notoriety, people express their views, feelings, values, experiences, likes and dislikes, ambition, and at times, prejudices. At times naїvely, at times deliberately, and at times, by accident, such contact may reach beyond people close to them to a much wider audience.

Your unofficial résumé

Ultimately, whether they are aware of it, much of the social media content becomes available for the world to search and see, and for people to make use of it whether the originator likes it or not, or intends for it to happen or not.

Companies have for some time been using social media like Facebook as part of an employment screening process, and this has expanded to professional screening facilities to screen applicants for positions by looking at their social media history. Inappropriate use of media, or expression of views has also lost people their jobs, careers and contracts due to ill-considered or downright prejudicial statements being expressed that are exposed to the whole world on places like Twitter.

However, given that criminals and terrorists are a part of this social network, we have also seen active steps to use social networking to investigate, come close to, and gather information on criminal actions. Use of undercover identities has been used in cases to come become close to criminals through a process of infiltrating and befriending Facebook networks and luring criminals out, including one I know where the investigator portrayed himself as a female model in order to get details of a murder suspect who wanted to meet ‘her’. In another instance, a suspect in a syndicate was confirmed when his Facebook page showed a picture of himself lying on a bed scattered with banknotes, and I’m sure not the first time this has happened on Facebook.

A range of options to monitor

In the US and elsewhere around the world, there is a trend to large companies and certainly government doing scanning on social media for a range of information. This can be related to public relations, marketing, product feedback, and even monitoring of possible movements or clustering of people for emergencies or disasters, major sporting occasions, launches, signing events for prominent personalities, and political movement rallies or meetings.

These may all require some kind of response by organisations to facilitate, secure, or police such organised or even spontaneous events. In addition, potential threats including those of protest, violence, or general social disruption may be anticipated, as well as threats to life including shootings, terrorism and things like bomb threats. The use of social media by organisations or individuals posing a danger to the public is increasingly becoming an aspect of the risk and threat analysis for companies and in some cases has become a standardised form of surveillance.

Social monitoring has therefore moved into the intelligence and risk space as a direct source of information to broader surveillance, including for CCTV applications and physical security on the ground.

Live monitoring

Recently I’ve seen an example of a dedicated social media monitoring room which is used for a variety of purposes include public relations, service delivery feedback, including customer opinions, and social event monitoring. However, built into this process is also a threat detection and intelligence capacity for the safeguarding of customers, visitors, prominent people and critical infrastructure.

It is one of the few times that I’ve seen people on their cellphones in a control room really working, as part of their answering of queries or provision of information. These kinds of facilitates monitor through the detection of words or terms, or possibly users and employ a number of products in order to do this. Being able to search for other characteristics such as gender or other identifiers may be available in certain packages.

This does come with responsibilities though. Given the international outcry about Cambridge Analytica and its data harvesting of Facebook information in order to psychologically profile voters during the 2016 US election, it shows that any processing of big data can be controversial in terms of how it is gathered and what is done with it. However, a search for ‘social media monitoring’ or using the term ‘listening’ will generate a number of products that can be used for general monitoring.

Key factors for such social media monitoring products include being able to simultaneously listen or track multiple sources, having a concise dashboard or control screen/s to do this, to be able to do so in real time, to have dynamic filters including the ability to define specific types of sources and types of media, to track influencers and sources, quantifying positive or negative nature of comments, and to respond to messages where necessary.

Some products provide pattern analysis and even graphical illustrations such as heat maps, which highlight locations or frequency of terms or users. The ability to analyse changes over time may also be a component that one evaluates as part of your intelligence gathering. To facilitate follow-up action, having a system or access to work out where the messages are coming from, and ideally who from may be possible under some circumstances. This is particularly the case where messages may involve criminal or even terrorist action and police or national intelligence may be involved.

Social media monitoring control rooms

Individualised, or on demand checking of social media at this stage is relatively common. We are more likely to see dedicated social media control rooms in the future though, based on what I have seen recently.

Social media monitoring involves getting access to extremely powerful data. The techniques and tools may be relatively available but the benefits are potentially very high in terms of intelligence information. By contributing to an intelligence-led surveillance strategy, this could lead to much higher success in stopping dangerous events or allowing for the detection and apprehension of potential suspects. Activation during strikes, emergencies and other events may also provide insights and a response method to quickly provide relevant and request driven information.

It also involves skilled usage including the nature of searches, and considered interpretation and evaluation in context. At the same time, to get on the wrong side of social media carries its own risks. Responsible usage and careful handling of the consequences is an important factor in any such use.

Dr Craig Donald is a human factors specialist in security and CCTV. He is a director of Leaderware which provides instruments for the selection of CCTV operators, X-ray screeners and other security personnel in major operations around the world. He also runs CCTV Surveillance Skills and Body Language, and Advanced Surveillance Body Language courses for CCTV operators, supervisors and managers internationally, and consults on CCTV management. He can be contacted on +27 11 787 7811 or [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

2024 Southern Africa OSPAs winners announced
Editor's Choice
The 2024 Southern Africa Outstanding Security Performance Awards (OSPAs) winners were revealed on Tuesday, June 11th, at the Securex South Africa Seminar Theatre hosted by SMART Security Solutions.

Read more...
Local manufacturing is still on the rise
Hissco Editor's Choice News & Events Security Services & Risk Management
HISSCO International, Africa's largest manufacturer of security X-ray products, has recently secured a multi-continental contract to supply over 55 baggage X-ray screening systems in 10 countries.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
Detecting humans within vehicles without opening the doors
Flow Systems News & Events Security Services & Risk Management
Flow Systems has introduced its new product, which detects humans trying to hide within a vehicle, truck, or container. Vehicles will be searched once they have stopped before one of Flow Systems' access control boom barriers.

Read more...
Cybercriminals embracing AI
Information Security Security Services & Risk Management
Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.

Read more...
The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Read more...
Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

Read more...
AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
MySecurityApp for SME security firms
Surveillance Integrated Solutions
Solution House Software has introduced MySecurityApp, a platform that expedites security operations management for startup and growing security companies by delivering a comprehensive and user-friendly mobile app designed to simplify setting up and growing security companies’ operations.

Read more...