SlideShare a Scribd company logo
1 of 49
Download to read offline
Introduction to the Responsible Use of
Social Media Monitoring and SOCMINT Tools
December, 2018
Dark Web
Refers specifically to a collection of websites that
exist on an encrypted network and cannot be found
by using traditional search engines or visited by
using traditional browsers. Almost all sites on the so-
called Dark Web hide their identity using the Tor
encryption tool.
Deep Web
All of the web pages, or websites that have not been
crawled by a search engine, are hidden behind
paywalls or require a username and password to
access. The opposite term is “surface web”.
Dark Social
A term used by marketers to describe website
referrals that are difficult to track. Dark social traffic
doesn't seem to have a specific source, which creates
a challenge for companies that are trying to monitor
website referrals and social media activity.
Open Source Intelligence (OSINT)
Data collected from publicly available sources to be used in
an intelligence context. In the intelligence community, the
term "open" refers to overt, publicly available sources.
Social Media Intelligence (SOCMINT)
A subset of OSINT that gathers information exclusively
from social media sites. It is typically analyzed from two
layers – one, the original published content and two, the
associated metadata.
Metadata
• Metadata is data about data. It’s information that's used to describe the data that's contained in something like a web page,
document, or file. A simple example of metadata for a document is author, file size, and the date created.
• Metadata comes in several types and is used for a variety of broad purposes that can be roughly categorized as business,
technical, or operational.
• Descriptive metadata properties include title, subject, genre, author and creation date, for example.
• Rights metadata might include copyright status, rights holder or license terms.
• Technical metadata properties include file types, size, creation date and time, and type of compression. Technical
metadata is often used for digital object management and interoperability.
• Preservation metadata is used in navigation. Example preservation metadata properties include an item's place in a
hierarchy or sequence.
• Markup Languages include metadata used for navigation and interoperability. Properties might include heading, name,
date, list, and paragraph.
• It is used everywhere, by every industry, in multiple ways
• Metadata availability on social media depends on each platform (e.g. hashtags on Twitter are a public form of metadata).
Metadata referring to the time/location of a photo or video is usually stripped upon upload.
Investigations are being
performed with public
access to social data
(SOCMINT) as opposed
to private access (i.e.
special access granted
by a warrant).
It is understood that what
your organization
can/cannot do as a
government organization
is very different from
what is theoretically
possible.
It is understood that your
organization should
create a stand-alone
protocol approved by
proper legal counsel
before using any of the
tools in an official
investigative capacity.
It is understood that the
state of social media is
constantly moving - what
is/isn't possible changes
on a daily basis. Any
provided information
may soon be out of date
and need to be regularly
updated.
Situational
Awareness
Developing an
overview of an
unknown situation or
event to focus future
analysis
Ongoing
Monitoring
Daily tracking of
account activity and
relevant keywords
within a topic area
Social Network
Analysis
Acquire an
understanding of the
social dynamics for
large-scale data to
tell you who and how
users are relating
Priority
Information
Requests
Ask a pointed
question to support
an important decision
Investigations
Acquire additional
information on a
person or
organization
Engagement
Analyze information
around a
communications goal
or objective to
provide engagement
and content
suggestions
Performance
Assess performance
effectiveness and
progress based on
defined metrics
measured against
targets
= focus of this session
2.5quintillion (18 zeros) new data bytes produced daily
90% of the world’s data has been produced in the last two years alone
Twitter still tends to be the most useful public data source for SOCMINT
TIPS FOR
INVESTIGATIONS
Basic operational security
steps during an investigation
• Encrypt your connection
• Ideally use a browser dedicated to investigations
• Keep your operating system and browsers updated
• Ensure that you are using incognito or stealth mode,
especially if you are not using the TOR browser
• Use anonymous search engines
• Use a dedicated password keeper
• Ensure your passwords are complex
• Run a virus and spyware scanner frequently
• Scan URLs you are unsure of
• Track your steps during an investigation
Tool
Categories
1.) Security
2.)
Advanced
Googling
3.) Verifying
Legitimacy
4.) Social
Search
5.) Network
Visualization
6.) Other
1 - SECURITY
1Password.com
Purpose: Provides a place for
users to store various
passwords,software licenses,
and other sensitive
information in a virtual vault
that is locked with a PBKDF2-
guarded master password.
Alternatives:
• Zoho Vault
• Dashlane
• LastPass
• LogMeOnce
• Password Boss
howsecureismypass
word.net
Purpose: A great way to see
how easy it would be for
someone to crack your
password.
duckduck.go
Purpose: Searching quickly
without being tracked
TOR Browser
Purpose: Useful when
anonymity is of paramount
importance. In the case of RoP it
can be used to access a TOR
compliant version of Facebook
(facebookcorewwwi.onion)
Hunchly.com
(Chrome Extension)
Purpose: Runs in the
background during your
investigation to capture each
page as you go.
2 – ADVANCED
GOOGLING
goo.gl/4XfNU8
Purpose: Become faster at
finding what you are looking
for.
google.ca/advanced
_search
Purpose: For people that don’t
have time to memorize search
operators
google→search
tools→date→custom
range
Purpose: To effectively search
through historical Google
data. Great for finding content
that no longer appears in the
top results.
3 – VERIFYING
LEGITIMACY
tineye.com
Purpose: To find all the places
that a particular image
appears online including the
original source (even if it was
modified)
exifdata.com
Purpose: Viewing image
metadata on the go
fotoforensics.com
Purpose: To determine if
there were any modifications
to an image
emailsherlock.com
pipl.com
Purpose: To help determine
the identity of the email owner
through scanning other places
the email has been used
online. Also great for
discovering fraudulent emails.
virustotal.com
Purpose: Analyze suspicious
files and URLs to detect types
of malware, automatically
share them with the security
community.
snopes.com
Purpose: To help prevent the
spread of disinformation.
Always use this before sharing
a breaking story that is hard to
believe.
4 - SOCIAL
SEARCH
inteltechniques.com
Purpose: To search through
FB,TW, LI and find people by
name, job, location, age,
gender, their friends, the
groups they are members of
etc. Also great for managing
your own digital footprint.
*Use findmyfbid.com to find an
ID number
goo.gl/x4RPbK (Chrome
Plugin)
Purpose: To search through
FB,TW, LI and find people by
name, job, location, age,
gender, their friends, the
groups they are members of
etc. Also great for managing
your own digital footprint.
tweetdeck.com
Purpose: To quickly filter
content based on media type,
engagement level, geo-
location, etc. in real-time
hootsuite.com
Purpose: To locate tweets in a
specific area
twitonomy.com
Purpose: To verify accounts
and better understand how
they interact and who they
influence.
trendsmap.com
Purpose: To identify real-time
trends anywhere in the world
on any language supported by
Twitter right down to city level
5 - NETWORK
VISUALIZATION
Social network analysis (SNA) is a strategy for
investigating social structures through the use
of network and graph theories. It characterizes
networked structures in terms of nodes (individual
actors, people, pages or things within the network)
and edges (relationships or interactions) that
connect them.
A sociogram is the visual representation of these
nodes and their relationships (edges) to one
another. The colour represents community
affiliation and the size of each node represents
importance of place in the network.
Reading a Twitter Account Sociogram Reading a Facebook Page-Like Network Sociogram
Node (circle) Each node is a Twitter account. Each node is a Facebook page.
Edge (line) Each edge is a connection between accounts that
interacted at least once with one another via a
tweet. Thicker edges mean more
tweets/interactions between those accounts.
Each edge is a page like. Pages in Facebook can like
other pages. There is no change in edge thickness on
these sociograms since pages can only like another
page once.
Colour Accounts that have something in common are
generally clustered together and have the same
colour due to their interactions.
Accounts that have something in common are
generally clustered together and have the same
colour due to their interactions.
Size Larger accounts tend to have more incoming tweets
from a greater number of important accounts. The
number of followers that an account has does not
influence this number.
Larger accounts tend to be liked by a greater
number of important pages. The number of
individuals who follow a page does not influence
this number.
Konigsberg Bridge Problem (1736)
First Grade Class (Grant - 1952)
Facebook Sociogram (2012)
Jefferson High School Sexual
Relationship Study (Stovel,
Moody, Bearman, 2005)
socioviz.net
Purpose: To quickly identify
the key influencers and
communities within a topic
area + to identify key hashtag
sub-topics
*Free version analyzes 500 of the latest tweets.
If you make a donation it allows 5000
TIP:You can
export to
GEPHI
analytics.mentionmapp.com
Purpose: To quickly identify
the general topics being
discussed around a central
user or hashtag + to explore
their surrounding networks
gephi.org
Purpose: This is the leading
visualization and exploration
software for all kinds of graphs
and networks. Best of all it’s
open source (FREE)
6 - OTHER
analytics.moz.com/p
ro/link-explorer/
Purpose: Determine what
other web domains are linking
to the web property in
question
who.is
Purpose: Determine who has
registered a particular
domain. Useful for finding
hidden contact info.
http://archive.org/web/
Purpose: Finding old and/or
deleted web properties
trends.google.com/tr
ends/explore
Purpose: To determine how
and when people search for a
specific topic
TIP:You can
export to
Excel + add
exclusion
terms
The slides for this presentation will be made available for download.
Mike Kujawski
Mobile: 613.899.1348
E-mail: mikekujawski@cepsm.ca
Website: cepsm.ca
LinkedIn: “Mike Kujawski”
Twitter: @mikekujawski
Skype: mikekujawski
Blog: mikekujawski.ca

More Related Content

What's hot

Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersDeborah Osborne
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and futureChristian Martorella
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 

What's hot (20)

OSINT
OSINTOSINT
OSINT
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 

Similar to Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools

Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisFarida Vis
 
Eavesdropping on the Twitter Microblogging Site
Eavesdropping on the Twitter Microblogging SiteEavesdropping on the Twitter Microblogging Site
Eavesdropping on the Twitter Microblogging SiteShalin Hai-Jew
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Try 25 best social search engines to get social information in 2022 (1)
Try 25 best social search engines to get social information in 2022 (1)Try 25 best social search engines to get social information in 2022 (1)
Try 25 best social search engines to get social information in 2022 (1)Olivia Russell CIRS, MS
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Tags, Networks, Narrative
Tags, Networks, NarrativeTags, Networks, Narrative
Tags, Networks, NarrativeBruce Mason
 
The evolution of research on social media
The evolution of research on social mediaThe evolution of research on social media
The evolution of research on social mediaFarida Vis
 
Social Media Data Collection & Analysis
Social Media Data Collection & AnalysisSocial Media Data Collection & Analysis
Social Media Data Collection & AnalysisScott Sanders
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...Fredrik Olsson
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
E commerce 2010 section- b
E commerce 2010 section- bE commerce 2010 section- b
E commerce 2010 section- bStudsPlanet.com
 

Similar to Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools (20)

Social Data Mining
Social Data MiningSocial Data Mining
Social Data Mining
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
ICT
ICTICT
ICT
 
Eavesdropping on the Twitter Microblogging Site
Eavesdropping on the Twitter Microblogging SiteEavesdropping on the Twitter Microblogging Site
Eavesdropping on the Twitter Microblogging Site
 
Gwapo
GwapoGwapo
Gwapo
 
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Try 25 best social search engines to get social information in 2022 (1)
Try 25 best social search engines to get social information in 2022 (1)Try 25 best social search engines to get social information in 2022 (1)
Try 25 best social search engines to get social information in 2022 (1)
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Tags, Networks, Narrative
Tags, Networks, NarrativeTags, Networks, Narrative
Tags, Networks, Narrative
 
The evolution of research on social media
The evolution of research on social mediaThe evolution of research on social media
The evolution of research on social media
 
Social Media Data Collection & Analysis
Social Media Data Collection & AnalysisSocial Media Data Collection & Analysis
Social Media Data Collection & Analysis
 
Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
 
Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...Online text data for machine learning, data science, and research - Who can p...
Online text data for machine learning, data science, and research - Who can p...
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
E commerce 2010 section- b
E commerce 2010 section- bE commerce 2010 section- b
E commerce 2010 section- b
 

More from Mike Kujawski

Integrating Behavioural Science in Government Communication
Integrating Behavioural Science in Government CommunicationIntegrating Behavioural Science in Government Communication
Integrating Behavioural Science in Government CommunicationMike Kujawski
 
How the public sector can better communicate change and technology disruption...
How the public sector can better communicate change and technology disruption...How the public sector can better communicate change and technology disruption...
How the public sector can better communicate change and technology disruption...Mike Kujawski
 
30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow 30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow Mike Kujawski
 
Immunization Hesitancy - A Brief Overview of Challenges and Opportunities Online
Immunization Hesitancy - A Brief Overview of Challenges and Opportunities OnlineImmunization Hesitancy - A Brief Overview of Challenges and Opportunities Online
Immunization Hesitancy - A Brief Overview of Challenges and Opportunities OnlineMike Kujawski
 
Yes, There’s a Tool for That! 25 Tips to Speed Up Your Day-to-Day Digital Wor...
Yes, There’s a Tool for That! 25 Tips to Speed Up Your Day-to-Day Digital Wor...Yes, There’s a Tool for That! 25 Tips to Speed Up Your Day-to-Day Digital Wor...
Yes, There’s a Tool for That! 25 Tips to Speed Up Your Day-to-Day Digital Wor...Mike Kujawski
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Mike Kujawski
 
Gamification: Silly fad or important trend for marketers?
Gamification: Silly fad or important trend for marketers?Gamification: Silly fad or important trend for marketers?
Gamification: Silly fad or important trend for marketers?Mike Kujawski
 
The State of Mobile in the Canadian Government (2012)
The State of Mobile in the Canadian Government (2012)The State of Mobile in the Canadian Government (2012)
The State of Mobile in the Canadian Government (2012)Mike Kujawski
 
Tracking your Organization's Digital Footprint
Tracking your Organization's Digital FootprintTracking your Organization's Digital Footprint
Tracking your Organization's Digital FootprintMike Kujawski
 
Measuring Social Media Success
Measuring Social Media SuccessMeasuring Social Media Success
Measuring Social Media SuccessMike Kujawski
 
Measuring the Success of Your Social Media Initiatives
Measuring the Success of Your Social Media InitiativesMeasuring the Success of Your Social Media Initiatives
Measuring the Success of Your Social Media InitiativesMike Kujawski
 
Cultiver La Communauté Mondiale (Web 2.0)
Cultiver La Communauté Mondiale (Web 2.0)Cultiver La Communauté Mondiale (Web 2.0)
Cultiver La Communauté Mondiale (Web 2.0)Mike Kujawski
 
Strategy Before Tactics
Strategy Before TacticsStrategy Before Tactics
Strategy Before TacticsMike Kujawski
 
Marketing Starts Inside the Organization
Marketing Starts Inside the OrganizationMarketing Starts Inside the Organization
Marketing Starts Inside the OrganizationMike Kujawski
 
Harnessing the Global Community in the Era of Web 2.0
Harnessing the Global Community in the Era of Web 2.0Harnessing the Global Community in the Era of Web 2.0
Harnessing the Global Community in the Era of Web 2.0Mike Kujawski
 
Government Blogging - Best Practices & Tips for Success
Government Blogging - Best Practices & Tips for SuccessGovernment Blogging - Best Practices & Tips for Success
Government Blogging - Best Practices & Tips for SuccessMike Kujawski
 
Social Media Monitoring - 10 Free Tools
Social Media Monitoring - 10 Free ToolsSocial Media Monitoring - 10 Free Tools
Social Media Monitoring - 10 Free ToolsMike Kujawski
 
Social Media & Canadian Government Usage Examples
Social Media & Canadian Government Usage ExamplesSocial Media & Canadian Government Usage Examples
Social Media & Canadian Government Usage ExamplesMike Kujawski
 

More from Mike Kujawski (19)

Integrating Behavioural Science in Government Communication
Integrating Behavioural Science in Government CommunicationIntegrating Behavioural Science in Government Communication
Integrating Behavioural Science in Government Communication
 
How the public sector can better communicate change and technology disruption...
How the public sector can better communicate change and technology disruption...How the public sector can better communicate change and technology disruption...
How the public sector can better communicate change and technology disruption...
 
30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow 30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow
 
Immunization Hesitancy - A Brief Overview of Challenges and Opportunities Online
Immunization Hesitancy - A Brief Overview of Challenges and Opportunities OnlineImmunization Hesitancy - A Brief Overview of Challenges and Opportunities Online
Immunization Hesitancy - A Brief Overview of Challenges and Opportunities Online
 
Yes, There’s a Tool for That! 25 Tips to Speed Up Your Day-to-Day Digital Wor...
Yes, There’s a Tool for That! 25 Tips to Speed Up Your Day-to-Day Digital Wor...Yes, There’s a Tool for That! 25 Tips to Speed Up Your Day-to-Day Digital Wor...
Yes, There’s a Tool for That! 25 Tips to Speed Up Your Day-to-Day Digital Wor...
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...
 
Gamification: Silly fad or important trend for marketers?
Gamification: Silly fad or important trend for marketers?Gamification: Silly fad or important trend for marketers?
Gamification: Silly fad or important trend for marketers?
 
The State of Mobile in the Canadian Government (2012)
The State of Mobile in the Canadian Government (2012)The State of Mobile in the Canadian Government (2012)
The State of Mobile in the Canadian Government (2012)
 
Tracking your Organization's Digital Footprint
Tracking your Organization's Digital FootprintTracking your Organization's Digital Footprint
Tracking your Organization's Digital Footprint
 
Measuring Social Media Success
Measuring Social Media SuccessMeasuring Social Media Success
Measuring Social Media Success
 
Measuring the Success of Your Social Media Initiatives
Measuring the Success of Your Social Media InitiativesMeasuring the Success of Your Social Media Initiatives
Measuring the Success of Your Social Media Initiatives
 
MK Quick Tip # 1
MK Quick Tip # 1MK Quick Tip # 1
MK Quick Tip # 1
 
Cultiver La Communauté Mondiale (Web 2.0)
Cultiver La Communauté Mondiale (Web 2.0)Cultiver La Communauté Mondiale (Web 2.0)
Cultiver La Communauté Mondiale (Web 2.0)
 
Strategy Before Tactics
Strategy Before TacticsStrategy Before Tactics
Strategy Before Tactics
 
Marketing Starts Inside the Organization
Marketing Starts Inside the OrganizationMarketing Starts Inside the Organization
Marketing Starts Inside the Organization
 
Harnessing the Global Community in the Era of Web 2.0
Harnessing the Global Community in the Era of Web 2.0Harnessing the Global Community in the Era of Web 2.0
Harnessing the Global Community in the Era of Web 2.0
 
Government Blogging - Best Practices & Tips for Success
Government Blogging - Best Practices & Tips for SuccessGovernment Blogging - Best Practices & Tips for Success
Government Blogging - Best Practices & Tips for Success
 
Social Media Monitoring - 10 Free Tools
Social Media Monitoring - 10 Free ToolsSocial Media Monitoring - 10 Free Tools
Social Media Monitoring - 10 Free Tools
 
Social Media & Canadian Government Usage Examples
Social Media & Canadian Government Usage ExamplesSocial Media & Canadian Government Usage Examples
Social Media & Canadian Government Usage Examples
 

Recently uploaded

Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDYgalaxypingy
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECall girl Jaipur
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxvemusae
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Delhi Call girls
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSheikhSaifAli1
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageSocioCosmos
 
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRStunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...anilsa9823
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"SocioCosmos
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for siteAshtonCains
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for siteAshtonCains
 
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...anilsa9823
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRDelhi Call girls
 
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Delhi Call girls
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensSocioCosmos
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for siteAshtonCains
 

Recently uploaded (20)

Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRStunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
Lucknow 💋 Dating Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Serv...
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
 
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 

Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools

  • 1. Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools December, 2018
  • 2.
  • 3. Dark Web Refers specifically to a collection of websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers. Almost all sites on the so- called Dark Web hide their identity using the Tor encryption tool. Deep Web All of the web pages, or websites that have not been crawled by a search engine, are hidden behind paywalls or require a username and password to access. The opposite term is “surface web”. Dark Social A term used by marketers to describe website referrals that are difficult to track. Dark social traffic doesn't seem to have a specific source, which creates a challenge for companies that are trying to monitor website referrals and social media activity.
  • 4. Open Source Intelligence (OSINT) Data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term "open" refers to overt, publicly available sources. Social Media Intelligence (SOCMINT) A subset of OSINT that gathers information exclusively from social media sites. It is typically analyzed from two layers – one, the original published content and two, the associated metadata.
  • 5. Metadata • Metadata is data about data. It’s information that's used to describe the data that's contained in something like a web page, document, or file. A simple example of metadata for a document is author, file size, and the date created. • Metadata comes in several types and is used for a variety of broad purposes that can be roughly categorized as business, technical, or operational. • Descriptive metadata properties include title, subject, genre, author and creation date, for example. • Rights metadata might include copyright status, rights holder or license terms. • Technical metadata properties include file types, size, creation date and time, and type of compression. Technical metadata is often used for digital object management and interoperability. • Preservation metadata is used in navigation. Example preservation metadata properties include an item's place in a hierarchy or sequence. • Markup Languages include metadata used for navigation and interoperability. Properties might include heading, name, date, list, and paragraph. • It is used everywhere, by every industry, in multiple ways • Metadata availability on social media depends on each platform (e.g. hashtags on Twitter are a public form of metadata). Metadata referring to the time/location of a photo or video is usually stripped upon upload.
  • 6. Investigations are being performed with public access to social data (SOCMINT) as opposed to private access (i.e. special access granted by a warrant). It is understood that what your organization can/cannot do as a government organization is very different from what is theoretically possible. It is understood that your organization should create a stand-alone protocol approved by proper legal counsel before using any of the tools in an official investigative capacity. It is understood that the state of social media is constantly moving - what is/isn't possible changes on a daily basis. Any provided information may soon be out of date and need to be regularly updated.
  • 7. Situational Awareness Developing an overview of an unknown situation or event to focus future analysis Ongoing Monitoring Daily tracking of account activity and relevant keywords within a topic area Social Network Analysis Acquire an understanding of the social dynamics for large-scale data to tell you who and how users are relating Priority Information Requests Ask a pointed question to support an important decision Investigations Acquire additional information on a person or organization Engagement Analyze information around a communications goal or objective to provide engagement and content suggestions Performance Assess performance effectiveness and progress based on defined metrics measured against targets = focus of this session
  • 8. 2.5quintillion (18 zeros) new data bytes produced daily 90% of the world’s data has been produced in the last two years alone Twitter still tends to be the most useful public data source for SOCMINT
  • 10. Basic operational security steps during an investigation • Encrypt your connection • Ideally use a browser dedicated to investigations • Keep your operating system and browsers updated • Ensure that you are using incognito or stealth mode, especially if you are not using the TOR browser • Use anonymous search engines • Use a dedicated password keeper • Ensure your passwords are complex • Run a virus and spyware scanner frequently • Scan URLs you are unsure of • Track your steps during an investigation
  • 11. Tool Categories 1.) Security 2.) Advanced Googling 3.) Verifying Legitimacy 4.) Social Search 5.) Network Visualization 6.) Other
  • 13. 1Password.com Purpose: Provides a place for users to store various passwords,software licenses, and other sensitive information in a virtual vault that is locked with a PBKDF2- guarded master password. Alternatives: • Zoho Vault • Dashlane • LastPass • LogMeOnce • Password Boss
  • 14. howsecureismypass word.net Purpose: A great way to see how easy it would be for someone to crack your password.
  • 16. TOR Browser Purpose: Useful when anonymity is of paramount importance. In the case of RoP it can be used to access a TOR compliant version of Facebook (facebookcorewwwi.onion)
  • 17. Hunchly.com (Chrome Extension) Purpose: Runs in the background during your investigation to capture each page as you go.
  • 19. goo.gl/4XfNU8 Purpose: Become faster at finding what you are looking for.
  • 20. google.ca/advanced _search Purpose: For people that don’t have time to memorize search operators
  • 21. google→search tools→date→custom range Purpose: To effectively search through historical Google data. Great for finding content that no longer appears in the top results.
  • 23. tineye.com Purpose: To find all the places that a particular image appears online including the original source (even if it was modified)
  • 25. fotoforensics.com Purpose: To determine if there were any modifications to an image
  • 26. emailsherlock.com pipl.com Purpose: To help determine the identity of the email owner through scanning other places the email has been used online. Also great for discovering fraudulent emails.
  • 27. virustotal.com Purpose: Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community.
  • 28. snopes.com Purpose: To help prevent the spread of disinformation. Always use this before sharing a breaking story that is hard to believe.
  • 30. inteltechniques.com Purpose: To search through FB,TW, LI and find people by name, job, location, age, gender, their friends, the groups they are members of etc. Also great for managing your own digital footprint. *Use findmyfbid.com to find an ID number
  • 31. goo.gl/x4RPbK (Chrome Plugin) Purpose: To search through FB,TW, LI and find people by name, job, location, age, gender, their friends, the groups they are members of etc. Also great for managing your own digital footprint.
  • 32. tweetdeck.com Purpose: To quickly filter content based on media type, engagement level, geo- location, etc. in real-time
  • 33. hootsuite.com Purpose: To locate tweets in a specific area
  • 34. twitonomy.com Purpose: To verify accounts and better understand how they interact and who they influence.
  • 35. trendsmap.com Purpose: To identify real-time trends anywhere in the world on any language supported by Twitter right down to city level
  • 37. Social network analysis (SNA) is a strategy for investigating social structures through the use of network and graph theories. It characterizes networked structures in terms of nodes (individual actors, people, pages or things within the network) and edges (relationships or interactions) that connect them. A sociogram is the visual representation of these nodes and their relationships (edges) to one another. The colour represents community affiliation and the size of each node represents importance of place in the network. Reading a Twitter Account Sociogram Reading a Facebook Page-Like Network Sociogram Node (circle) Each node is a Twitter account. Each node is a Facebook page. Edge (line) Each edge is a connection between accounts that interacted at least once with one another via a tweet. Thicker edges mean more tweets/interactions between those accounts. Each edge is a page like. Pages in Facebook can like other pages. There is no change in edge thickness on these sociograms since pages can only like another page once. Colour Accounts that have something in common are generally clustered together and have the same colour due to their interactions. Accounts that have something in common are generally clustered together and have the same colour due to their interactions. Size Larger accounts tend to have more incoming tweets from a greater number of important accounts. The number of followers that an account has does not influence this number. Larger accounts tend to be liked by a greater number of important pages. The number of individuals who follow a page does not influence this number.
  • 38. Konigsberg Bridge Problem (1736) First Grade Class (Grant - 1952) Facebook Sociogram (2012) Jefferson High School Sexual Relationship Study (Stovel, Moody, Bearman, 2005)
  • 39. socioviz.net Purpose: To quickly identify the key influencers and communities within a topic area + to identify key hashtag sub-topics *Free version analyzes 500 of the latest tweets. If you make a donation it allows 5000 TIP:You can export to GEPHI
  • 40. analytics.mentionmapp.com Purpose: To quickly identify the general topics being discussed around a central user or hashtag + to explore their surrounding networks
  • 41. gephi.org Purpose: This is the leading visualization and exploration software for all kinds of graphs and networks. Best of all it’s open source (FREE)
  • 43. analytics.moz.com/p ro/link-explorer/ Purpose: Determine what other web domains are linking to the web property in question
  • 44. who.is Purpose: Determine who has registered a particular domain. Useful for finding hidden contact info.
  • 45. http://archive.org/web/ Purpose: Finding old and/or deleted web properties
  • 46. trends.google.com/tr ends/explore Purpose: To determine how and when people search for a specific topic TIP:You can export to Excel + add exclusion terms
  • 47. The slides for this presentation will be made available for download.
  • 48.
  • 49. Mike Kujawski Mobile: 613.899.1348 E-mail: mikekujawski@cepsm.ca Website: cepsm.ca LinkedIn: “Mike Kujawski” Twitter: @mikekujawski Skype: mikekujawski Blog: mikekujawski.ca