Social Media Intelligence (SOCMINT)
Social media intelligence (SOCMINT) is an increasingly important component of digital intelligence, itself now a major source of information for police, security and intelligence authorities on the identities, location, movement, financing and intentions of their suspects. The growth in use of social media for these purposes is explained, with examples of tactical, operational and strategic use. Issues around the use of data analytics and computerized sentiment analysis are explored. The legal and ethical implications of state monitoring of social media are examined critically with the example of the UK as a nation that has comprehensive legislation and oversight to ensure respect for personal privacy.
- Al Jazeera. (2013). Post by Hamza Mohamed, Al-Shabab Say They are Back on Twitter, http://www.aljazeera.com/news/africa/2013/12/al-shabab-claim-they-are-back-twitter-2013121610453327578.html, 16 December 2013.
- Aldrich, Richard. (2002). The Hidden Hand: Britain, America and Cold War Secret Intelligence, New York: Overlook.Google Scholar
- Anderson, David. (2015). A Question of Trust: Report of the Investigatory Powers Review, London, June 2015, available at https://terrorismlegislationreviewer.independent.gov.uk/
- Bain, Andrew. (1964). The Growth of Television Ownership in the United Kingdom since the War: A Lognormal Model, Cambridge: University Press.Google Scholar
- Barge, James and Endsor, Mick. (2015). A Structural Analysis of Social Media Networks, International Centre for Social Media Analysis, The Policy Institute@King’s College London.Google Scholar
- BBCM. (2015). BBC Monitoring Report, http://www.bbc.co.uk/monitoring/instragram-a-big-hit-among-iranian-leadership, 18 June 2015.
- Bruce, James and Bennett, Michael. (2004). Foreign Denial and Deception: Analytical Imperatives, in Roger George and James Bruce (Eds.) Analysing Intelligence, Washington: Georgetown University Press.Google Scholar
- Corera, Gordon. (2015). Intercept: The Secret History of Computers and Spies, London: Weidenfeld and Nicolson, ch. 9.Google Scholar
- Criminal Justice Degrees Guide. (2012). 20 Infamous Crimes Committed and Solved on Facebook, available at http://mashable.com/2012/03/01/facebook-crimes/.
- DCLG. (2013). Department for Communities and Local Government, Government Response to the Riots: Final Report, London, HMSO, July 2013.Google Scholar
- Demos. (2014). The New Face of Digital Populism, a publication of the Centre for the Analysis of Social Media, available at http://www.demos.co.uk/projects/casm.
- ECHR. (1953). European Convention on Human Rights, available at http://www.echr.coe.int/Documents/Convention_ENG.pdf.
- Economist. (2015). The Truly Personal Computer, 28 February 2015 print edition, available at http://www.economist.com/news/briefing/21645131-smartphone-defining-technology-age-truly-personal-computer.
- Fairclough, Norman. (2003). Analysing Discourse: Textual Analysis for Social Research, London: Routledge.Google Scholar
- First Look. (2015). The Intercept, 22 June 2015 Posting of DSTL Paper, Behavioural Science Support for JTRIG, dated 11 November 2011, available at https://firstlook.org/theintercept/document/2015/06/22/behavioural-science-support-jtrig/.
- Go-Globe, 26 Dec 2015. Infographic at www.go-globe/blog/social-media-addiction.
- Gupta, Ravi and Brooks, Hugh. (2013). Using Social Media for Global Security, New York: Wiley.Google Scholar
- Herald Scotland. (2012). Police Develop Technology to Monitor Social Media Networks, Glasgow: The Herald, August 2012, available at http://www.heraldscotland.com/news/home-news/police-develop-technology-to-monitor-social-neworks.18357627.Google Scholar
- HMIC. (2011). Her Majesty’s Inspectorate of Constabulary, The Rules of Engagement: A Review of the August 2011 Disorders, London: Crown Copyright 2011, pp. 36–39.Google Scholar
- ICSR, Carter, Joseph A., Maher, Shiraz and Neumann, Peter R. (2014). Who Inspires the Syrian Foreign Fighters? London: ICSR, available at http://icsr.info/2014/04/icsr-insight-inspires-syrian-foreign-fighters/.Google Scholar
- Kaye, David. (2015). Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, UN General Assembly, Human Rights Council, 29th Session, 22 May 2015, available at http://daccess-dds-ny.un.org/doc/UNDOC/GEN/G15/095/85/PDF/G1509585.pdf?OpenElement.
- Klausen, Jytte, Barbieri, Eliane, Reichlin-Melnick, Aaron and Aaron, Zelin. (2012). The You-Tube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign, Perspectives on Terrorism, Vol. 6, No. 1. pp. 36–53.Google Scholar
- Lucas, Edward. (2015). Cyberphobia, London: Bloomsbury, ch. 5.Google Scholar
- Naughton, John. (2012). From Gutenberg to Zuckerberg, London: Quercus.Google Scholar
- Omand, David. (2010). Securing the State, London: Hurst.Google Scholar
- Omand, David. (2015). Understanding Digital Intelligence And The Norms That Might Govern It, Ottawa: CIGI and London: Chatham House.Google Scholar
- Parker, Andrew. (2015). Address to the Royal United Services Institute, London, 8 January 2015, available on https://www.mi5.gov.uk/home/about-us/who-we-are/staff-and-management/director-general.html.
- Sawers, John. (2015). The Limits of Security, Lecture Delivered at King’s College London on 16 February 2015, available at http://www.kcl.ac.uk/sspp/departments/warstudies/news/newsrecords/sawers.aspx.
- Suler, John. (2004). The On-Line Disinhibition Effect, Journal of Cyberpsychology and Behaviour, Vol. 7, No. 3. pp. 321–326.Google Scholar
- Sun. (2012). US Bars Friends over Twitter Joke, article in the Sun newspaper, 30 January 2012, available at http://www.thesun.co.uk/sol/homepage/news/4095372/Twitter-news-US-bars-friends-over-Twitter-joke.html.
- UN. (1948). Article 12 of the UN Declaration of Human Rights, available at http://www.un.org/en/documents/udhr/.
- Ushahidi Nepal. (2015). Description at http://www.ushahidi.com/2015/04/25/supporting-online-volunteer-response-to-the-nepal-earthquake/.