SocialSocial MediaMedia ProfilingProfiling &&
PredictivePredictive IntelligenceIntelligence
SURENDER SINGH
Senior Public Prosecutor
National Investigation Agency
Social Media ProfilingSocial Media Profiling
Social Media Profiling is the process of constructing aSocial Media Profiling is the process of constructing a
user’s profile using his or her social media data. Thereuser’s profile using his or her social media data. There
are many mediums & platforms for sharing suchare many mediums & platforms for sharing such
information e.g. Google+, Facebook, Whatsapp, LinkedIninformation e.g. Google+, Facebook, Whatsapp, LinkedIn
& Twitter etc.& Twitter etc.
 A person’s social data refers to the personal data,A person’s social data refers to the personal data,
which is generate either online or offline.which is generate either online or offline.
 A large amount of such data, including a person’sA large amount of such data, including a person’s
language, location and interest, which is shared throughlanguage, location and interest, which is shared through
social media and social network; and collectively itsocial media and social network; and collectively it
creates a person’s social profile.creates a person’s social profile.
Social Media PlatformsSocial Media Platforms --
 FacebookFacebook
 TwitterTwitter
 LinkedInLinkedIn
 InstagramInstagram
 Google+Google+
 WhatsappWhatsapp
 YouTube etc.YouTube etc.
Social MediaSocial Media –– FacebookFacebook
##did you knowdid you know??
Exposure of Personal Life
Free & open to anyone
Privacy Controls
Be Aware:
 Facebook does not share with users who is looking at their profile.
 Access to listed friends, family and colleagues.
 If you look at someone’s profile often enough, FB assumes you are acquainted and
starts to recommend you to that person. (stalkers) – Careful!!!
 Facebook will pay YOU between $500 - $10K if you find a ‘bug’ or can hack your
way ‘’in’’; you’ve saved them the trouble of locating this themselves.
 WhatsApp (which can also be used on your computer) allows access to a users
entire contact list, which is a valuable target for hackers. Status: continues to rely
on open sourcing in order to allow programs to fix bugs & improve security.
 Criticism: Security
Terrorism
Privacy
Social MediaSocial Media -- FacebookFacebook
##careful what you typecareful what you type
Social MediaSocial Media –– FacebookFacebook
##facebook crimesfacebook crimes
………Continue to enjoy social media; but BE AWARE of the crimes so
you minimize your risk of becoming a victim!
7 Most Common Facebook Crimes:
Scams
Cyber-
Bullying
Stalking Robbery
Identity
Theft
Defamation
Defamation: is the communication of a false statement that harms the reputation of an
individual person, business, product, group, government, religion, or nation.
FACEBOOKFACEBOOK
#clear your browsers sometimes#clear your browsers sometimes --
Social MediaSocial Media -- FacebookFacebook
Social MediaSocial Media -- TwitterTwitter
Twitter messages are public, but users can send private messages;
Free & open to anyone;
Twitter is a real-time information network that connects you to the latest information about what
you find interesting;
Twitter was created in March 2006 by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams
based in San Francisco, CA.
Free & open to anyone;
Be Aware:
Twitter collects ‘’personal identifiable information’’ and shares it with 3rd parties as
specified in their privacy policy. Twitter has the right to sell this information as an
asset if the company changes hands.
Twitter does not display advertisements, but advertisers can target users based
on their history of tweets & may quote tweets in ads directed specifically to the
user.
Twitter is banned in Iran, China, North Korea. In some countries also: Egypt,
Turkey and Venezuela
Social MediaSocial Media -- TwitterTwitter
Social MediaSocial Media -- TwitterTwitter
Amanda Michelle ToddAmanda Michelle Todd
tragedytragedy #call#call--forfor--helphelp
November 27, 1996November 27, 1996 –– October 10, 2012October 10, 2012
Age: 15 / British
Columbian, Canada
Videos on YouTube to tell
about her blackmail
Blackmailed into
showing her breast
on webcam
Cyber-Bullied
Image source: http://i.huffpost.com/gen/812481/thumbs/o-AMANDA-TODD-facebook.jpg
Cyber-Bullied
Physically Assaulted
Video (9-minutes, not one word)
went viral after her death
w/ more than 12 million
views as of Feb. 2017.
Mother ‘Carol’ has created
a program against Cyber-
Bullies since her death.
SOCIAL MEDIA TOOLSSOCIAL MEDIA TOOLS
• A range of tools available suitable for SMEs or large corporates, or both.
FREE TOOLFREE TOOL –– GOOGLE ALERTSGOOGLE ALERTS
• Google Alerts are emails
sent to you when Google
finds new results that
match your search term
(e.g. web pages,
newspaper articles, blogs)
• You can use Google Alerts
to monitor anything on the
web
www.google.com/alerts
Predictive IntelligencePredictive Intelligence --
Predictive Intelligence encompasses aPredictive Intelligence encompasses a
variety of statistical techniques from datavariety of statistical techniques from data
mining, predictive modeling, and learningmining, predictive modeling, and learning
that analyze current and historical facts tothat analyze current and historical facts to
make predictions about future or otherwisemake predictions about future or otherwisemake predictions about future or otherwisemake predictions about future or otherwise
unknown events.unknown events.
Predictive intelligence is used in marketing,Predictive intelligence is used in marketing,
financial services, retail, stock exchange,financial services, retail, stock exchange,
healthcare, child protection, organized crimehealthcare, child protection, organized crime
&& TerrorismTerrorism etc.etc.
Social Media IntelligenceSocial Media Intelligence --
ImportanceImportance
 Since social media are stored asSince social media are stored as
computerized data (e.g. text, numbers), thecomputerized data (e.g. text, numbers), the
process of monitoring and analyzing theirprocess of monitoring and analyzing their
activities and dialogs becomes easier andactivities and dialogs becomes easier and
more effective.more effective.
 Social Media Analytics and motoring toolsSocial Media Analytics and motoring tools
are computational tools used for thisare computational tools used for this
purpose.purpose.
PredictionAnalyseAcquire
Social MediaSocial Media IntelligenceIntelligence --
The three keyThe three key actionsactions
Acquire
Evidences
Analyse what
they prove
Predictive
Intelligence
Social Media
Monitoring
DataAcquisition
1
SOCIALSOCIAL MEDIA INTELLIGENCEMEDIA INTELLIGENCE
FRAMEWORKFRAMEWORK --
Acquire
Cleansing
& Noise
Filtering
Data
Integration
Natural
Language
Processing
Analytics tools
serving all
types of users
Multichannel
delivery
Integrating data into
centralized hosted
cloud
2
3
4
5
Process &Analyze
PREDICTION
CASE STUDYCASE STUDY --
 ISIS CASE: RCISIS CASE: RC--14/2015/DLI/NIA14/2015/DLI/NIA
 J&K TERROR FINANCING:J&K TERROR FINANCING: RCRC--10/2017/DLI/NIA10/2017/DLI/NIA
 FIF CASEFIF CASE
Benefits of Social MediaBenefits of Social Media
Intelligence AnalysisIntelligence Analysis
 Measure and monitor public opinionMeasure and monitor public opinion
through live monitoring and analysis ofthrough live monitoring and analysis of
public opinion trends and sentiment onpublic opinion trends and sentiment on
social media.social media.
 Proactive Crisis Management.Proactive Crisis Management.
 Tracking specific national securityTracking specific national security
information, such as how terrorists areinformation, such as how terrorists are
communicating to their audiences and whatcommunicating to their audiences and what
they are communicating.they are communicating.
AnyAny
QuestionQuestion ??QuestionQuestion ??

SURENDER SINGH Senior Prosecutor NIA

  • 1.
    SocialSocial MediaMedia ProfilingProfiling&& PredictivePredictive IntelligenceIntelligence SURENDER SINGH Senior Public Prosecutor National Investigation Agency
  • 2.
    Social Media ProfilingSocialMedia Profiling Social Media Profiling is the process of constructing aSocial Media Profiling is the process of constructing a user’s profile using his or her social media data. Thereuser’s profile using his or her social media data. There are many mediums & platforms for sharing suchare many mediums & platforms for sharing such information e.g. Google+, Facebook, Whatsapp, LinkedIninformation e.g. Google+, Facebook, Whatsapp, LinkedIn & Twitter etc.& Twitter etc.  A person’s social data refers to the personal data,A person’s social data refers to the personal data, which is generate either online or offline.which is generate either online or offline.  A large amount of such data, including a person’sA large amount of such data, including a person’s language, location and interest, which is shared throughlanguage, location and interest, which is shared through social media and social network; and collectively itsocial media and social network; and collectively it creates a person’s social profile.creates a person’s social profile.
  • 3.
    Social Media PlatformsSocialMedia Platforms --  FacebookFacebook  TwitterTwitter  LinkedInLinkedIn  InstagramInstagram  Google+Google+  WhatsappWhatsapp  YouTube etc.YouTube etc.
  • 4.
    Social MediaSocial Media–– FacebookFacebook ##did you knowdid you know?? Exposure of Personal Life Free & open to anyone Privacy Controls Be Aware:  Facebook does not share with users who is looking at their profile.  Access to listed friends, family and colleagues.  If you look at someone’s profile often enough, FB assumes you are acquainted and starts to recommend you to that person. (stalkers) – Careful!!!  Facebook will pay YOU between $500 - $10K if you find a ‘bug’ or can hack your way ‘’in’’; you’ve saved them the trouble of locating this themselves.  WhatsApp (which can also be used on your computer) allows access to a users entire contact list, which is a valuable target for hackers. Status: continues to rely on open sourcing in order to allow programs to fix bugs & improve security.  Criticism: Security Terrorism Privacy
  • 5.
    Social MediaSocial Media-- FacebookFacebook ##careful what you typecareful what you type
  • 6.
    Social MediaSocial Media–– FacebookFacebook ##facebook crimesfacebook crimes ………Continue to enjoy social media; but BE AWARE of the crimes so you minimize your risk of becoming a victim! 7 Most Common Facebook Crimes: Scams Cyber- Bullying Stalking Robbery Identity Theft Defamation Defamation: is the communication of a false statement that harms the reputation of an individual person, business, product, group, government, religion, or nation.
  • 7.
    FACEBOOKFACEBOOK #clear your browserssometimes#clear your browsers sometimes --
  • 8.
    Social MediaSocial Media-- FacebookFacebook
  • 9.
    Social MediaSocial Media-- TwitterTwitter Twitter messages are public, but users can send private messages; Free & open to anyone; Twitter is a real-time information network that connects you to the latest information about what you find interesting; Twitter was created in March 2006 by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams based in San Francisco, CA. Free & open to anyone; Be Aware: Twitter collects ‘’personal identifiable information’’ and shares it with 3rd parties as specified in their privacy policy. Twitter has the right to sell this information as an asset if the company changes hands. Twitter does not display advertisements, but advertisers can target users based on their history of tweets & may quote tweets in ads directed specifically to the user. Twitter is banned in Iran, China, North Korea. In some countries also: Egypt, Turkey and Venezuela
  • 10.
    Social MediaSocial Media-- TwitterTwitter
  • 11.
    Social MediaSocial Media-- TwitterTwitter
  • 12.
    Amanda Michelle ToddAmandaMichelle Todd tragedytragedy #call#call--forfor--helphelp November 27, 1996November 27, 1996 –– October 10, 2012October 10, 2012 Age: 15 / British Columbian, Canada Videos on YouTube to tell about her blackmail Blackmailed into showing her breast on webcam Cyber-Bullied Image source: http://i.huffpost.com/gen/812481/thumbs/o-AMANDA-TODD-facebook.jpg Cyber-Bullied Physically Assaulted Video (9-minutes, not one word) went viral after her death w/ more than 12 million views as of Feb. 2017. Mother ‘Carol’ has created a program against Cyber- Bullies since her death.
  • 13.
    SOCIAL MEDIA TOOLSSOCIALMEDIA TOOLS • A range of tools available suitable for SMEs or large corporates, or both.
  • 14.
    FREE TOOLFREE TOOL–– GOOGLE ALERTSGOOGLE ALERTS • Google Alerts are emails sent to you when Google finds new results that match your search term (e.g. web pages, newspaper articles, blogs) • You can use Google Alerts to monitor anything on the web www.google.com/alerts
  • 15.
    Predictive IntelligencePredictive Intelligence-- Predictive Intelligence encompasses aPredictive Intelligence encompasses a variety of statistical techniques from datavariety of statistical techniques from data mining, predictive modeling, and learningmining, predictive modeling, and learning that analyze current and historical facts tothat analyze current and historical facts to make predictions about future or otherwisemake predictions about future or otherwisemake predictions about future or otherwisemake predictions about future or otherwise unknown events.unknown events. Predictive intelligence is used in marketing,Predictive intelligence is used in marketing, financial services, retail, stock exchange,financial services, retail, stock exchange, healthcare, child protection, organized crimehealthcare, child protection, organized crime && TerrorismTerrorism etc.etc.
  • 16.
    Social Media IntelligenceSocialMedia Intelligence -- ImportanceImportance  Since social media are stored asSince social media are stored as computerized data (e.g. text, numbers), thecomputerized data (e.g. text, numbers), the process of monitoring and analyzing theirprocess of monitoring and analyzing their activities and dialogs becomes easier andactivities and dialogs becomes easier and more effective.more effective.  Social Media Analytics and motoring toolsSocial Media Analytics and motoring tools are computational tools used for thisare computational tools used for this purpose.purpose.
  • 17.
    PredictionAnalyseAcquire Social MediaSocial MediaIntelligenceIntelligence -- The three keyThe three key actionsactions Acquire Evidences Analyse what they prove Predictive Intelligence Social Media Monitoring
  • 18.
    DataAcquisition 1 SOCIALSOCIAL MEDIA INTELLIGENCEMEDIAINTELLIGENCE FRAMEWORKFRAMEWORK -- Acquire Cleansing & Noise Filtering Data Integration Natural Language Processing Analytics tools serving all types of users Multichannel delivery Integrating data into centralized hosted cloud 2 3 4 5 Process &Analyze PREDICTION
  • 19.
    CASE STUDYCASE STUDY--  ISIS CASE: RCISIS CASE: RC--14/2015/DLI/NIA14/2015/DLI/NIA  J&K TERROR FINANCING:J&K TERROR FINANCING: RCRC--10/2017/DLI/NIA10/2017/DLI/NIA  FIF CASEFIF CASE
  • 20.
    Benefits of SocialMediaBenefits of Social Media Intelligence AnalysisIntelligence Analysis  Measure and monitor public opinionMeasure and monitor public opinion through live monitoring and analysis ofthrough live monitoring and analysis of public opinion trends and sentiment onpublic opinion trends and sentiment on social media.social media.  Proactive Crisis Management.Proactive Crisis Management.  Tracking specific national securityTracking specific national security information, such as how terrorists areinformation, such as how terrorists are communicating to their audiences and whatcommunicating to their audiences and what they are communicating.they are communicating.
  • 21.