Share Email Print

Proceedings Paper

The role of social media in the intelligence cycle
Author(s): Bruce Forrester; Kees den Hollander
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Social Media (SM) is a relatively new phenomenon. Intelligence agencies have been struggling to understand how to exploit the social pulse that flows from this source. The paper starts with a brief overview of SM with some examples of how it is being used by adversaries and how we might be able to exploit this usage. Often treated as another form of open source intelligence (OSINT), we look at some of the differences with traditional OSINT compared to SM then outline the possible uses by military intelligence.

The next section looks at how SM fits into the different phases of the intelligence cycle: Direction, Collection, Processing and Dissemination. For the first phase, Direction, a number of questions are identified that can be answered typically by SM. For the second phase, the Collection, it is explained how SM, as an asset, transfers questions into methods and the use of different SM resources (e.g. marketer, cognitive behavioral psychologist) and sources to seek the required information.

SM is exploited as a multi-intelligence capability. For the Processing phase some aspects are described in how to deal with this capacity (e.g. enabling other intelligence sources) and also which techniques are used to be able to validate the SM sources used.

Paper Details

Date Published: 12 May 2016
PDF: 14 pages
Proc. SPIE 9851, Next-Generation Analyst IV, 98510G (12 May 2016); doi: 10.1117/12.2242530
Show Author Affiliations
Bruce Forrester, Defence Research and Development Canada, Valcartier (Canada)
Kees den Hollander, TNO (Netherlands)

Published in SPIE Proceedings Vol. 9851:
Next-Generation Analyst IV
Barbara D. Broome; Timothy P. Hanratty; David L. Hall; James Llinas, Editor(s)

© SPIE. Terms of Use
Back to Top