Risk
1/26/2012
12:18 PM
Connect Directly
RSS
E-Mail
50%
50%

FBI Seeks Data-Mining App for Social Media

Agency wants to monitor Facebook, Twitter, and other sites for real-time information that could help investigations.

Obama's Tech Tools
(click image for larger view)
Slideshow: Obama's TechTools
The FBI has become the latest federal agency interested in mining social media for intelligence information.

The agency is looking for ideas for developing a social media application that can search for significant data from social networking activity to be used for intelligence purposes, according to a request for information (RFI) posted on FedBizOpps.gov.

The FBI is looking for a "geospatial alert and analysis mapping application" that will allow its Strategic Information and Operations Center (SIOC) to "quickly vet, identify and geo-locate breaking events, incidents and emerging threats," according to the RFI.

[ How does data mining affect user privacy? See Global CIO: Data Mining Faces The Supreme Court Test. ]

The agency wants the tool to be in the form of a "secure, lightweight web application portal, using mashup technology," and plans to use it to share information with intelligence partners to coordinate and synchronize awareness of events across operations, it said.

Moreover, the application must be "infinitely flexible" to adapt to changing threats, and those using it must have access to a common operating dashboard from which they can view both unclassified open-source information feeds and use tools to analyze social media during a crisis as it happens.

Other features the FBI hopes its data-mining tool will have include the ability to automatically "search and scrape" social-networking and open-source news websites for information about breaking world events. It also wants to give users of the tool the ability to do relevant keyword searches on sites such as Facebook, CNN, Fox News, and other popular information outlets on the Internet.

The FBI is certainly not the first federal agency to recognize the value in information being shared via social media.

Other federal agencies--including the CIA, Department of Homeland Security (DHS), and even the research agency for federal intelligence efforts, the Intelligence Advanced Research Projects Agency (IARPA)--also are interested in mining the Web for picking up clues about public opinion or world events for use in their respective missions.

In addition to its own aim to build a data-mining tool, the FBI also will likely benefit from the fruits of IARPA’s research efforts in this area. IARPA is seeking to create technology that will continuously analyze and mine data from websites, blogs, social media, and other public information to help it better forecast global events.

In the meantime, In-Q-Tel, the investment firm established by the CIA to support U.S. intelligence agencies, has invested in a startup called Visible Technologies that monitors social media content on the Web so agencies can watch and analyze public opinion on the Web as revealed through social networks.

The DHS, too, has said it monitors Twitter, Facebook, and other popular websites to help it maintain situational awareness and perform its necessary duties in support of international crises and events such as the earthquake in Haiti.

The right forensic tools in the right hands are just a start. The new Digital Detectives issue of Dark Reading shows you how to better apply the lessons they teach. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Jai Krishna Ponnappan
50%
50%
Jai Krishna Ponnappan,
User Rank: Apprentice
2/19/2012 | 11:11:04 PM
re: FBI Seeks Data-Mining App for Social Media
Apart from seeking to use a customized data mining tool they should aim to build intuitive software solutions that evolve incrementally and cyclically based again on proven artificial intelligence technologies. Several large corporations and businesses are already leveraging vital information and value adding intelligence to either boost several of their operations, successfully identify major and minor risk events, understand insider knowledge and predictive trends that were otherwise quiet simply impossible to decipher and even gain a solid competitive advantage. Of course all this can only happen if they can clearly and fully demarcate and know what it is that is the scope of what they want from a tool such as this and unfortunately the power it brings to the table is always open to either misuse or abuse and mixing levels of authority and jurisdiction requires even more stringent and complex measures to ensure appropriate and ethical use. Such systems can prove to be highly beneficial and insightful and the idea behind it has been deployed successfully by several industries all over the globe. There are several areas of application and scenarios particularly within Law enforcement and crime detection where an ethical and acceptable predictive tool can really help assist with better preparedness and responses.

Thank you for the interesting post.

Best Wishes & Regards,
Jai Krishna Ponnappan :)
Bprince
50%
50%
Bprince,
User Rank: Ninja
1/28/2012 | 3:52:47 AM
re: FBI Seeks Data-Mining App for Social Media
Lots of evidence street gangs are using Facebook, YouTube, etc, to promote their gangs and in some cases discuss crimes, and I just saw a story about people firing guns at a t-shirt of Obama and putting it on Facebook. Needless to say, they are now under investigation.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.