SlideShare a Scribd company logo
SocialSocial MediaMedia ProfilingProfiling &&
PredictivePredictive IntelligenceIntelligence
SURENDER SINGH
Senior Public Prosecutor
National Investigation Agency
Social Media ProfilingSocial Media Profiling
Social Media Profiling is the process of constructing aSocial Media Profiling is the process of constructing a
user’s profile using his or her social media data. Thereuser’s profile using his or her social media data. There
are many mediums & platforms for sharing suchare many mediums & platforms for sharing such
information e.g. Google+, Facebook, Whatsapp, LinkedIninformation e.g. Google+, Facebook, Whatsapp, LinkedIn
& Twitter etc.& Twitter etc.
 A person’s social data refers to the personal data,A person’s social data refers to the personal data,
which is generate either online or offline.which is generate either online or offline.
 A large amount of such data, including a person’sA large amount of such data, including a person’s
language, location and interest, which is shared throughlanguage, location and interest, which is shared through
social media and social network; and collectively itsocial media and social network; and collectively it
creates a person’s social profile.creates a person’s social profile.
Social Media PlatformsSocial Media Platforms --
 FacebookFacebook
 TwitterTwitter
 LinkedInLinkedIn
 InstagramInstagram
 Google+Google+
 WhatsappWhatsapp
 YouTube etc.YouTube etc.
Social MediaSocial Media –– FacebookFacebook
##did you knowdid you know??
Exposure of Personal Life
Free & open to anyone
Privacy Controls
Be Aware:
 Facebook does not share with users who is looking at their profile.
 Access to listed friends, family and colleagues.
 If you look at someone’s profile often enough, FB assumes you are acquainted and
starts to recommend you to that person. (stalkers) – Careful!!!
 Facebook will pay YOU between $500 - $10K if you find a ‘bug’ or can hack your
way ‘’in’’; you’ve saved them the trouble of locating this themselves.
 WhatsApp (which can also be used on your computer) allows access to a users
entire contact list, which is a valuable target for hackers. Status: continues to rely
on open sourcing in order to allow programs to fix bugs & improve security.
 Criticism: Security
Terrorism
Privacy
Social MediaSocial Media -- FacebookFacebook
##careful what you typecareful what you type
Social MediaSocial Media –– FacebookFacebook
##facebook crimesfacebook crimes
………Continue to enjoy social media; but BE AWARE of the crimes so
you minimize your risk of becoming a victim!
7 Most Common Facebook Crimes:
Scams
Cyber-
Bullying
Stalking Robbery
Identity
Theft
Defamation
Defamation: is the communication of a false statement that harms the reputation of an
individual person, business, product, group, government, religion, or nation.
FACEBOOKFACEBOOK
#clear your browsers sometimes#clear your browsers sometimes --
Social MediaSocial Media -- FacebookFacebook
Social MediaSocial Media -- TwitterTwitter
Twitter messages are public, but users can send private messages;
Free & open to anyone;
Twitter is a real-time information network that connects you to the latest information about what
you find interesting;
Twitter was created in March 2006 by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams
based in San Francisco, CA.
Free & open to anyone;
Be Aware:
Twitter collects ‘’personal identifiable information’’ and shares it with 3rd parties as
specified in their privacy policy. Twitter has the right to sell this information as an
asset if the company changes hands.
Twitter does not display advertisements, but advertisers can target users based
on their history of tweets & may quote tweets in ads directed specifically to the
user.
Twitter is banned in Iran, China, North Korea. In some countries also: Egypt,
Turkey and Venezuela
Social MediaSocial Media -- TwitterTwitter
Social MediaSocial Media -- TwitterTwitter
Amanda Michelle ToddAmanda Michelle Todd
tragedytragedy #call#call--forfor--helphelp
November 27, 1996November 27, 1996 –– October 10, 2012October 10, 2012
Age: 15 / British
Columbian, Canada
Videos on YouTube to tell
about her blackmail
Blackmailed into
showing her breast
on webcam
Cyber-Bullied
Image source: http://i.huffpost.com/gen/812481/thumbs/o-AMANDA-TODD-facebook.jpg
Cyber-Bullied
Physically Assaulted
Video (9-minutes, not one word)
went viral after her death
w/ more than 12 million
views as of Feb. 2017.
Mother ‘Carol’ has created
a program against Cyber-
Bullies since her death.
SOCIAL MEDIA TOOLSSOCIAL MEDIA TOOLS
• A range of tools available suitable for SMEs or large corporates, or both.
FREE TOOLFREE TOOL –– GOOGLE ALERTSGOOGLE ALERTS
• Google Alerts are emails
sent to you when Google
finds new results that
match your search term
(e.g. web pages,
newspaper articles, blogs)
• You can use Google Alerts
to monitor anything on the
web
www.google.com/alerts
Predictive IntelligencePredictive Intelligence --
Predictive Intelligence encompasses aPredictive Intelligence encompasses a
variety of statistical techniques from datavariety of statistical techniques from data
mining, predictive modeling, and learningmining, predictive modeling, and learning
that analyze current and historical facts tothat analyze current and historical facts to
make predictions about future or otherwisemake predictions about future or otherwisemake predictions about future or otherwisemake predictions about future or otherwise
unknown events.unknown events.
Predictive intelligence is used in marketing,Predictive intelligence is used in marketing,
financial services, retail, stock exchange,financial services, retail, stock exchange,
healthcare, child protection, organized crimehealthcare, child protection, organized crime
&& TerrorismTerrorism etc.etc.
Social Media IntelligenceSocial Media Intelligence --
ImportanceImportance
 Since social media are stored asSince social media are stored as
computerized data (e.g. text, numbers), thecomputerized data (e.g. text, numbers), the
process of monitoring and analyzing theirprocess of monitoring and analyzing their
activities and dialogs becomes easier andactivities and dialogs becomes easier and
more effective.more effective.
 Social Media Analytics and motoring toolsSocial Media Analytics and motoring tools
are computational tools used for thisare computational tools used for this
purpose.purpose.
PredictionAnalyseAcquire
Social MediaSocial Media IntelligenceIntelligence --
The three keyThe three key actionsactions
Acquire
Evidences
Analyse what
they prove
Predictive
Intelligence
Social Media
Monitoring
DataAcquisition
1
SOCIALSOCIAL MEDIA INTELLIGENCEMEDIA INTELLIGENCE
FRAMEWORKFRAMEWORK --
Acquire
Cleansing
& Noise
Filtering
Data
Integration
Natural
Language
Processing
Analytics tools
serving all
types of users
Multichannel
delivery
Integrating data into
centralized hosted
cloud
2
3
4
5
Process &Analyze
PREDICTION
CASE STUDYCASE STUDY --
 ISIS CASE: RCISIS CASE: RC--14/2015/DLI/NIA14/2015/DLI/NIA
 J&K TERROR FINANCING:J&K TERROR FINANCING: RCRC--10/2017/DLI/NIA10/2017/DLI/NIA
 FIF CASEFIF CASE
Benefits of Social MediaBenefits of Social Media
Intelligence AnalysisIntelligence Analysis
 Measure and monitor public opinionMeasure and monitor public opinion
through live monitoring and analysis ofthrough live monitoring and analysis of
public opinion trends and sentiment onpublic opinion trends and sentiment on
social media.social media.
 Proactive Crisis Management.Proactive Crisis Management.
 Tracking specific national securityTracking specific national security
information, such as how terrorists areinformation, such as how terrorists are
communicating to their audiences and whatcommunicating to their audiences and what
they are communicating.they are communicating.
AnyAny
QuestionQuestion ??QuestionQuestion ??

More Related Content

What's hot

Fake news and how to combat it
Fake news and how to combat itFake news and how to combat it
Fake news and how to combat it
Sanjana Hattotuwa
 
9.30
9.309.30
Data and Creativity: The Perfect Marriage
Data and Creativity: The Perfect MarriageData and Creativity: The Perfect Marriage
Data and Creativity: The Perfect Marriage
Rafael Lebrón Febles
 
Fake news and the economy of emotions
Fake news and the economy of emotionsFake news and the economy of emotions
Fake news and the economy of emotions
Vian Bakir
 
Cybersecurity winter is not coming…
Cybersecurity winter is not coming…Cybersecurity winter is not coming…
Cybersecurity winter is not coming…
ITrust - Cybersecurity as a Service
 
PSC 497---THESIS PAPER
PSC 497---THESIS PAPERPSC 497---THESIS PAPER
PSC 497---THESIS PAPERNash Jones
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Duty identity-credibility
Duty identity-credibilityDuty identity-credibility
Duty identity-credibility
Prashant Bhattacharji
 
Finding and engaging minority influencers on social media
Finding and engaging minority influencers on social mediaFinding and engaging minority influencers on social media
Finding and engaging minority influencers on social media
Elon iMedia
 
Handling fake news and eyewitness media
Handling fake news and eyewitness mediaHandling fake news and eyewitness media
Handling fake news and eyewitness media
Alastair Reid
 
Education - Situational Awareness
Education - Situational AwarenessEducation - Situational Awareness
Education - Situational Awareness
21Engineers
 
Fake news detection project
Fake news detection projectFake news detection project
Fake news detection project
HarshdaGhai
 
Law Enforcement - LifeRaft
Law Enforcement - LifeRaftLaw Enforcement - LifeRaft
Law Enforcement - LifeRaft
21Engineers
 
Fake News Workshop Powerpoint Presentation
Fake News Workshop Powerpoint PresentationFake News Workshop Powerpoint Presentation
Fake News Workshop Powerpoint Presentation
Lauren Sullivan Justice
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
SASIG Workshop on “Improving the digital landscape for our children”
SASIG Workshop on “Improving the digital landscape for our children”SASIG Workshop on “Improving the digital landscape for our children”
SASIG Workshop on “Improving the digital landscape for our children”
The Open University
 
COM 427 Social Media and Security
COM 427 Social Media and SecurityCOM 427 Social Media and Security
COM 427 Social Media and Security
Kyle Basedow
 
Media sosial dan hoax
Media sosial dan hoaxMedia sosial dan hoax
Media sosial dan hoax
Ridho Fitrah Hyzkia
 
Fact-checking in an Era of Fake News and Misinformation
Fact-checking in an Era of Fake News and MisinformationFact-checking in an Era of Fake News and Misinformation
Fact-checking in an Era of Fake News and Misinformation
David Nzoputa Ofili
 

What's hot (20)

Fake news and how to combat it
Fake news and how to combat itFake news and how to combat it
Fake news and how to combat it
 
9.30
9.309.30
9.30
 
Data and Creativity: The Perfect Marriage
Data and Creativity: The Perfect MarriageData and Creativity: The Perfect Marriage
Data and Creativity: The Perfect Marriage
 
Fake news and the economy of emotions
Fake news and the economy of emotionsFake news and the economy of emotions
Fake news and the economy of emotions
 
Cybersecurity winter is not coming…
Cybersecurity winter is not coming…Cybersecurity winter is not coming…
Cybersecurity winter is not coming…
 
PSC 497---THESIS PAPER
PSC 497---THESIS PAPERPSC 497---THESIS PAPER
PSC 497---THESIS PAPER
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Duty identity-credibility
Duty identity-credibilityDuty identity-credibility
Duty identity-credibility
 
Finding and engaging minority influencers on social media
Finding and engaging minority influencers on social mediaFinding and engaging minority influencers on social media
Finding and engaging minority influencers on social media
 
War-of-Keywords
War-of-KeywordsWar-of-Keywords
War-of-Keywords
 
Handling fake news and eyewitness media
Handling fake news and eyewitness mediaHandling fake news and eyewitness media
Handling fake news and eyewitness media
 
Education - Situational Awareness
Education - Situational AwarenessEducation - Situational Awareness
Education - Situational Awareness
 
Fake news detection project
Fake news detection projectFake news detection project
Fake news detection project
 
Law Enforcement - LifeRaft
Law Enforcement - LifeRaftLaw Enforcement - LifeRaft
Law Enforcement - LifeRaft
 
Fake News Workshop Powerpoint Presentation
Fake News Workshop Powerpoint PresentationFake News Workshop Powerpoint Presentation
Fake News Workshop Powerpoint Presentation
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
SASIG Workshop on “Improving the digital landscape for our children”
SASIG Workshop on “Improving the digital landscape for our children”SASIG Workshop on “Improving the digital landscape for our children”
SASIG Workshop on “Improving the digital landscape for our children”
 
COM 427 Social Media and Security
COM 427 Social Media and SecurityCOM 427 Social Media and Security
COM 427 Social Media and Security
 
Media sosial dan hoax
Media sosial dan hoaxMedia sosial dan hoax
Media sosial dan hoax
 
Fact-checking in an Era of Fake News and Misinformation
Fact-checking in an Era of Fake News and MisinformationFact-checking in an Era of Fake News and Misinformation
Fact-checking in an Era of Fake News and Misinformation
 

Similar to SURENDER SINGH Senior Prosecutor NIA

EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
Yaman Singhania
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
Dr Raghu Khimani
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
Nathan Wright
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
Impulse Digital
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
Sandeep Thoniparambil
 
sih_ppt2.pptx
sih_ppt2.pptxsih_ppt2.pptx
sih_ppt2.pptx
KartikeySahu7
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
RACHANAB18
 
SOCIAL NETWORKING.pptx
SOCIAL NETWORKING.pptxSOCIAL NETWORKING.pptx
SOCIAL NETWORKING.pptx
kanikavishwakarma1
 
Through a comprehensive exploration of research findings, case studies, and r...
Through a comprehensive exploration of research findings, case studies, and r...Through a comprehensive exploration of research findings, case studies, and r...
Through a comprehensive exploration of research findings, case studies, and r...
akhileshKumar86166
 
Social dilemma
Social dilemmaSocial dilemma
Social dilemma
Utkarshagarwal998
 
Social Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPSocial Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOP
Kathy Swanson
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other things
Sara-Jayne Terp
 
Getting Fresh…Socially. A Social Fresh EAST Recap.
Getting Fresh…Socially. A Social Fresh EAST Recap.Getting Fresh…Socially. A Social Fresh EAST Recap.
Getting Fresh…Socially. A Social Fresh EAST Recap.
ClearEdge Marketing
 
Sociial media
Sociial media Sociial media
Sociial media
ANMOLKUMARSINGH5
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
gailmowal
 
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Gab Billones
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
Abhishek Sharma
 
SOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARYSOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARY
AnOnM4niH4cK
 
Dr. Strangelove or How I Learned To Stop Worrying and Love The Social Media
Dr. Strangelove or How I Learned To Stop Worrying and Love The Social MediaDr. Strangelove or How I Learned To Stop Worrying and Love The Social Media
Dr. Strangelove or How I Learned To Stop Worrying and Love The Social Mediajonmoss
 
Dr. Strangelove or How I Learned To Stop Worrying And Love The Social Media
Dr. Strangelove or How I Learned To Stop Worrying And Love The Social MediaDr. Strangelove or How I Learned To Stop Worrying And Love The Social Media
Dr. Strangelove or How I Learned To Stop Worrying And Love The Social Media
MMLabs
 

Similar to SURENDER SINGH Senior Prosecutor NIA (20)

EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
sih_ppt2.pptx
sih_ppt2.pptxsih_ppt2.pptx
sih_ppt2.pptx
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
 
SOCIAL NETWORKING.pptx
SOCIAL NETWORKING.pptxSOCIAL NETWORKING.pptx
SOCIAL NETWORKING.pptx
 
Through a comprehensive exploration of research findings, case studies, and r...
Through a comprehensive exploration of research findings, case studies, and r...Through a comprehensive exploration of research findings, case studies, and r...
Through a comprehensive exploration of research findings, case studies, and r...
 
Social dilemma
Social dilemmaSocial dilemma
Social dilemma
 
Social Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPSocial Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOP
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other things
 
Getting Fresh…Socially. A Social Fresh EAST Recap.
Getting Fresh…Socially. A Social Fresh EAST Recap.Getting Fresh…Socially. A Social Fresh EAST Recap.
Getting Fresh…Socially. A Social Fresh EAST Recap.
 
Sociial media
Sociial media Sociial media
Sociial media
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
SOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARYSOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARY
 
Dr. Strangelove or How I Learned To Stop Worrying and Love The Social Media
Dr. Strangelove or How I Learned To Stop Worrying and Love The Social MediaDr. Strangelove or How I Learned To Stop Worrying and Love The Social Media
Dr. Strangelove or How I Learned To Stop Worrying and Love The Social Media
 
Dr. Strangelove or How I Learned To Stop Worrying And Love The Social Media
Dr. Strangelove or How I Learned To Stop Worrying And Love The Social MediaDr. Strangelove or How I Learned To Stop Worrying And Love The Social Media
Dr. Strangelove or How I Learned To Stop Worrying And Love The Social Media
 

Recently uploaded

一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
ahcitycouncil
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
SERUDS INDIA
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 

Recently uploaded (20)

一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 

SURENDER SINGH Senior Prosecutor NIA

  • 1. SocialSocial MediaMedia ProfilingProfiling && PredictivePredictive IntelligenceIntelligence SURENDER SINGH Senior Public Prosecutor National Investigation Agency
  • 2. Social Media ProfilingSocial Media Profiling Social Media Profiling is the process of constructing aSocial Media Profiling is the process of constructing a user’s profile using his or her social media data. Thereuser’s profile using his or her social media data. There are many mediums & platforms for sharing suchare many mediums & platforms for sharing such information e.g. Google+, Facebook, Whatsapp, LinkedIninformation e.g. Google+, Facebook, Whatsapp, LinkedIn & Twitter etc.& Twitter etc.  A person’s social data refers to the personal data,A person’s social data refers to the personal data, which is generate either online or offline.which is generate either online or offline.  A large amount of such data, including a person’sA large amount of such data, including a person’s language, location and interest, which is shared throughlanguage, location and interest, which is shared through social media and social network; and collectively itsocial media and social network; and collectively it creates a person’s social profile.creates a person’s social profile.
  • 3. Social Media PlatformsSocial Media Platforms --  FacebookFacebook  TwitterTwitter  LinkedInLinkedIn  InstagramInstagram  Google+Google+  WhatsappWhatsapp  YouTube etc.YouTube etc.
  • 4. Social MediaSocial Media –– FacebookFacebook ##did you knowdid you know?? Exposure of Personal Life Free & open to anyone Privacy Controls Be Aware:  Facebook does not share with users who is looking at their profile.  Access to listed friends, family and colleagues.  If you look at someone’s profile often enough, FB assumes you are acquainted and starts to recommend you to that person. (stalkers) – Careful!!!  Facebook will pay YOU between $500 - $10K if you find a ‘bug’ or can hack your way ‘’in’’; you’ve saved them the trouble of locating this themselves.  WhatsApp (which can also be used on your computer) allows access to a users entire contact list, which is a valuable target for hackers. Status: continues to rely on open sourcing in order to allow programs to fix bugs & improve security.  Criticism: Security Terrorism Privacy
  • 5. Social MediaSocial Media -- FacebookFacebook ##careful what you typecareful what you type
  • 6. Social MediaSocial Media –– FacebookFacebook ##facebook crimesfacebook crimes ………Continue to enjoy social media; but BE AWARE of the crimes so you minimize your risk of becoming a victim! 7 Most Common Facebook Crimes: Scams Cyber- Bullying Stalking Robbery Identity Theft Defamation Defamation: is the communication of a false statement that harms the reputation of an individual person, business, product, group, government, religion, or nation.
  • 7. FACEBOOKFACEBOOK #clear your browsers sometimes#clear your browsers sometimes --
  • 8. Social MediaSocial Media -- FacebookFacebook
  • 9. Social MediaSocial Media -- TwitterTwitter Twitter messages are public, but users can send private messages; Free & open to anyone; Twitter is a real-time information network that connects you to the latest information about what you find interesting; Twitter was created in March 2006 by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams based in San Francisco, CA. Free & open to anyone; Be Aware: Twitter collects ‘’personal identifiable information’’ and shares it with 3rd parties as specified in their privacy policy. Twitter has the right to sell this information as an asset if the company changes hands. Twitter does not display advertisements, but advertisers can target users based on their history of tweets & may quote tweets in ads directed specifically to the user. Twitter is banned in Iran, China, North Korea. In some countries also: Egypt, Turkey and Venezuela
  • 10. Social MediaSocial Media -- TwitterTwitter
  • 11. Social MediaSocial Media -- TwitterTwitter
  • 12. Amanda Michelle ToddAmanda Michelle Todd tragedytragedy #call#call--forfor--helphelp November 27, 1996November 27, 1996 –– October 10, 2012October 10, 2012 Age: 15 / British Columbian, Canada Videos on YouTube to tell about her blackmail Blackmailed into showing her breast on webcam Cyber-Bullied Image source: http://i.huffpost.com/gen/812481/thumbs/o-AMANDA-TODD-facebook.jpg Cyber-Bullied Physically Assaulted Video (9-minutes, not one word) went viral after her death w/ more than 12 million views as of Feb. 2017. Mother ‘Carol’ has created a program against Cyber- Bullies since her death.
  • 13. SOCIAL MEDIA TOOLSSOCIAL MEDIA TOOLS • A range of tools available suitable for SMEs or large corporates, or both.
  • 14. FREE TOOLFREE TOOL –– GOOGLE ALERTSGOOGLE ALERTS • Google Alerts are emails sent to you when Google finds new results that match your search term (e.g. web pages, newspaper articles, blogs) • You can use Google Alerts to monitor anything on the web www.google.com/alerts
  • 15. Predictive IntelligencePredictive Intelligence -- Predictive Intelligence encompasses aPredictive Intelligence encompasses a variety of statistical techniques from datavariety of statistical techniques from data mining, predictive modeling, and learningmining, predictive modeling, and learning that analyze current and historical facts tothat analyze current and historical facts to make predictions about future or otherwisemake predictions about future or otherwisemake predictions about future or otherwisemake predictions about future or otherwise unknown events.unknown events. Predictive intelligence is used in marketing,Predictive intelligence is used in marketing, financial services, retail, stock exchange,financial services, retail, stock exchange, healthcare, child protection, organized crimehealthcare, child protection, organized crime && TerrorismTerrorism etc.etc.
  • 16. Social Media IntelligenceSocial Media Intelligence -- ImportanceImportance  Since social media are stored asSince social media are stored as computerized data (e.g. text, numbers), thecomputerized data (e.g. text, numbers), the process of monitoring and analyzing theirprocess of monitoring and analyzing their activities and dialogs becomes easier andactivities and dialogs becomes easier and more effective.more effective.  Social Media Analytics and motoring toolsSocial Media Analytics and motoring tools are computational tools used for thisare computational tools used for this purpose.purpose.
  • 17. PredictionAnalyseAcquire Social MediaSocial Media IntelligenceIntelligence -- The three keyThe three key actionsactions Acquire Evidences Analyse what they prove Predictive Intelligence Social Media Monitoring
  • 18. DataAcquisition 1 SOCIALSOCIAL MEDIA INTELLIGENCEMEDIA INTELLIGENCE FRAMEWORKFRAMEWORK -- Acquire Cleansing & Noise Filtering Data Integration Natural Language Processing Analytics tools serving all types of users Multichannel delivery Integrating data into centralized hosted cloud 2 3 4 5 Process &Analyze PREDICTION
  • 19. CASE STUDYCASE STUDY --  ISIS CASE: RCISIS CASE: RC--14/2015/DLI/NIA14/2015/DLI/NIA  J&K TERROR FINANCING:J&K TERROR FINANCING: RCRC--10/2017/DLI/NIA10/2017/DLI/NIA  FIF CASEFIF CASE
  • 20. Benefits of Social MediaBenefits of Social Media Intelligence AnalysisIntelligence Analysis  Measure and monitor public opinionMeasure and monitor public opinion through live monitoring and analysis ofthrough live monitoring and analysis of public opinion trends and sentiment onpublic opinion trends and sentiment on social media.social media.  Proactive Crisis Management.Proactive Crisis Management.  Tracking specific national securityTracking specific national security information, such as how terrorists areinformation, such as how terrorists are communicating to their audiences and whatcommunicating to their audiences and what they are communicating.they are communicating.