Knowlesys

Application of social networking in open source intelligence

1. Take the initiative to extract information

After the intelligence personnel determine the target of intelligence collection, they actively pay attention to the target of intelligence collection through social platforms during the implementation of the plan, and use various means to obtain the required information.

In July 2018, intelligence personnel of a terrorist organization in the Gaza area installed spyware on target mobile phones through two online dating sites to obtain intelligence. They started by stealing photos and personal information from the Facebook profiles of real women in the real world, found Israeli soldiers on social media and added friends, and then lured them into downloading fake apps. In the end, intelligence personnel activated the mobile phone cameras and microphones of Israeli soldiers, accessed the contents of the mobile phones, controlled certain mobile phone functions, and obtained certain military confidential information or photos that could be used to blackmail soldiers.

2. Comprehensive analysis of data

Intelligence personnel collect, process, analyze and extract valuable intelligence from complex and diverse online social data sets. Due to the large number of users and information categories on social networking platforms, the U.S. government has been actively organizing Facebook, Twitter, YouTube and other major social media sites in the country to create a shared database and establish a logical process for network social intelligence analysis. The analysis process consists of defining the target—intelligence decomposition—building a target model—evaluating selection—refining—structural forecasting.

Especially in the fight against terrorism, the intelligence agencies of the United States and Britain have specially established a "social" database of international terrorists. By entering the information of several suspicious individuals in the big data, and then using network social analysis tools to sort out the suspects who have chatted with them, analyze their relationship network, and finally dig out the core characters. Based on this, the leader of the terrorists can be deduced, and the upcoming terrorist attacks can be predicted and prevented. Although this method of intelligence acquisition is relatively passive, it needs to wait for the target object to be updated. And when the number of targets of interest is large, manual screening is time-consuming and labor-intensive. However, the United States and the United Kingdom have used this method to obtain intelligence in the anti-terrorism operations against the Islamic State and Al Qaeda.

3. Guide network social users to participate

Through careful planning and marketing activities in advance, attract members on the social network to participate and provide suggestions to obtain the required intelligence.

The General Electric Company of the United States used this "social idea" method to attract nearly 100,000 users on social platforms to participate in the discussion and collect the information needed by the company. Whoever's suggestion is adopted can get the preferential ticket provided by the company.

As a result, in less than half a day, the company collected thousands of opinions. Some suggest that in order to promote energy saving and emission reduction, environmentally friendly tableware should be introduced on all company flights, and disposable water cups, cutlery, garbage bags, etc. made of natural biomass degradable materials should be used to replace heavily polluting plastic or paper lunch boxes; Some users suggested that more audio-visual facilities and food reservation services should be provided on the plane, so that passengers will not feel so boring, and they can also taste delicious food. Even if they are not used to airplane meals, they can pre-order food such as burgers. The company promptly selects reasonable suggestions from network users, improves the process and service system, and greatly improves customer satisfaction.



【Web Intelligence Monitoring】●Advantages of open source intelligence
銆怰esources銆戔棌The 27 most popular AI Tools in 2023
【Open Source Intelligence】●10 core professional competencies for intelligence analysts
銆怤ews銆戔棌Access control giant hit by ransom attack, NATO, Alibaba, Thales and others affected
銆怰esources銆戔棌The Achilles heel of AI startups: no shortage of money, but a lack of training data
【Artificial Intelligence】●Advanced tips for using ChatGPT-4