Social Media Intelligence (SOCMINT)

  • David OmandEmail author


Social media intelligence (SOCMINT) is an increasingly important component of digital intelligence, itself now a major source of information for police, security and intelligence authorities on the identities, location, movement, financing and intentions of their suspects. The growth in use of social media for these purposes is explained, with examples of tactical, operational and strategic use. Issues around the use of data analytics and computerized sentiment analysis are explored. The legal and ethical implications of state monitoring of social media are examined critically with the example of the UK as a nation that has comprehensive legislation and oversight to ensure respect for personal privacy.


  1. Al Jazeera. (2013). Post by Hamza Mohamed, Al-Shabab Say They are Back on Twitter,, 16 December 2013.
  2. Aldrich, Richard. (2002). The Hidden Hand: Britain, America and Cold War Secret Intelligence, New York: Overlook.Google Scholar
  3. Anderson, David. (2015). A Question of Trust: Report of the Investigatory Powers Review, London, June 2015, available at
  4. Bain, Andrew. (1964). The Growth of Television Ownership in the United Kingdom since the War: A Lognormal Model, Cambridge: University Press.Google Scholar
  5. Barge, James and Endsor, Mick. (2015). A Structural Analysis of Social Media Networks, International Centre for Social Media Analysis, The Policy Institute@King’s College London.Google Scholar
  6. BBCM. (2015). BBC Monitoring Report,, 18 June 2015.
  7. Botta, Frederico, Moat, Helen and Preis, Tobias. (2015). Quantifying Crowd Size with Mobile Phone and Twitter Data, London: R. Soc. Open sci 2:150162, available at, accessed 25 June 2015.Google Scholar
  8. Bruce, James and Bennett, Michael. (2004). Foreign Denial and Deception: Analytical Imperatives, in Roger George and James Bruce (Eds.) Analysing Intelligence, Washington: Georgetown University Press.Google Scholar
  9. Corera, Gordon. (2015). Intercept: The Secret History of Computers and Spies, London: Weidenfeld and Nicolson, ch. 9.Google Scholar
  10. Criminal Justice Degrees Guide. (2012). 20 Infamous Crimes Committed and Solved on Facebook, available at
  11. DCLG. (2013). Department for Communities and Local Government, Government Response to the Riots: Final Report, London, HMSO, July 2013.Google Scholar
  12. Demos. (2014). The New Face of Digital Populism, a publication of the Centre for the Analysis of Social Media, available at
  13. ECHR. (1953). European Convention on Human Rights, available at
  14. Economist. (2015). The Truly Personal Computer, 28 February 2015 print edition, available at
  15. Fairclough, Norman. (2003). Analysing Discourse: Textual Analysis for Social Research, London: Routledge.Google Scholar
  16. First Look. (2015). The Intercept, 22 June 2015 Posting of DSTL Paper, Behavioural Science Support for JTRIG, dated 11 November 2011, available at
  17. Go-Globe, 26 Dec 2015. Infographic at www.go-globe/blog/social-media-addiction.
  18. Gupta, Ravi and Brooks, Hugh. (2013). Using Social Media for Global Security, New York: Wiley.Google Scholar
  19. Herald Scotland. (2012). Police Develop Technology to Monitor Social Media Networks, Glasgow: The Herald, August 2012, available at Scholar
  20. HMIC. (2011). Her Majesty’s Inspectorate of Constabulary, The Rules of Engagement: A Review of the August 2011 Disorders, London: Crown Copyright 2011, pp. 36–39.Google Scholar
  21. Hobbs, Christopher, Moran, Matthew and Salisbury, Daniel. (2014). Open Source Intelligence in the Twenty-First Century: New Approaches and Opportunities, London: Palgrave Macmillan.CrossRefGoogle Scholar
  22. ICSR, Carter, Joseph A., Maher, Shiraz and Neumann, Peter R. (2014). Who Inspires the Syrian Foreign Fighters? London: ICSR, available at Scholar
  23. Kaye, David. (2015). Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, UN General Assembly, Human Rights Council, 29th Session, 22 May 2015, available at
  24. Klausen, Jytte, Barbieri, Eliane, Reichlin-Melnick, Aaron and Aaron, Zelin. (2012). The You-Tube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign, Perspectives on Terrorism, Vol. 6, No. 1. pp. 36–53.Google Scholar
  25. Lucas, Edward. (2015). Cyberphobia, London: Bloomsbury, ch. 5.Google Scholar
  26. Naughton, John. (2012). From Gutenberg to Zuckerberg, London: Quercus.Google Scholar
  27. Omand, David. (2010). Securing the State, London: Hurst.Google Scholar
  28. Omand, David. (2015). Understanding Digital Intelligence And The Norms That Might Govern It, Ottawa: CIGI and London: Chatham House.Google Scholar
  29. Omand, David, Bartlett, Jamie and Miller, Carl. (2012). Introducing Social Media Intelligence (SOCMINT), Intelligence and National Security, Vol. 27, No. 6, 801–823, December 2012.CrossRefGoogle Scholar
  30. Parker, Andrew. (2015). Address to the Royal United Services Institute, London, 8 January 2015, available on
  31. Sawers, John. (2015). The Limits of Security, Lecture Delivered at King’s College London on 16 February 2015, available at
  32. Suler, John. (2004). The On-Line Disinhibition Effect, Journal of Cyberpsychology and Behaviour, Vol. 7, No. 3. pp. 321–326.Google Scholar
  33. Sun. (2012). US Bars Friends over Twitter Joke, article in the Sun newspaper, 30 January 2012, available at
  34. UN. (1948). Article 12 of the UN Declaration of Human Rights, available at

Copyright information

© The Author(s) 2017

Authors and Affiliations

  1. 1.Department of War StudiesKing’s College LondonLondonUK

Personalised recommendations