Risk
1/26/2012
12:18 PM
50%
50%

FBI Seeks Data-Mining App for Social Media

Agency wants to monitor Facebook, Twitter, and other sites for real-time information that could help investigations.

Obama's Tech Tools
(click image for larger view)
Slideshow: Obama's TechTools
The FBI has become the latest federal agency interested in mining social media for intelligence information.

The agency is looking for ideas for developing a social media application that can search for significant data from social networking activity to be used for intelligence purposes, according to a request for information (RFI) posted on FedBizOpps.gov.

The FBI is looking for a "geospatial alert and analysis mapping application" that will allow its Strategic Information and Operations Center (SIOC) to "quickly vet, identify and geo-locate breaking events, incidents and emerging threats," according to the RFI.

[ How does data mining affect user privacy? See Global CIO: Data Mining Faces The Supreme Court Test. ]

The agency wants the tool to be in the form of a "secure, lightweight web application portal, using mashup technology," and plans to use it to share information with intelligence partners to coordinate and synchronize awareness of events across operations, it said.

Moreover, the application must be "infinitely flexible" to adapt to changing threats, and those using it must have access to a common operating dashboard from which they can view both unclassified open-source information feeds and use tools to analyze social media during a crisis as it happens.

Other features the FBI hopes its data-mining tool will have include the ability to automatically "search and scrape" social-networking and open-source news websites for information about breaking world events. It also wants to give users of the tool the ability to do relevant keyword searches on sites such as Facebook, CNN, Fox News, and other popular information outlets on the Internet.

The FBI is certainly not the first federal agency to recognize the value in information being shared via social media.

Other federal agencies--including the CIA, Department of Homeland Security (DHS), and even the research agency for federal intelligence efforts, the Intelligence Advanced Research Projects Agency (IARPA)--also are interested in mining the Web for picking up clues about public opinion or world events for use in their respective missions.

In addition to its own aim to build a data-mining tool, the FBI also will likely benefit from the fruits of IARPA’s research efforts in this area. IARPA is seeking to create technology that will continuously analyze and mine data from websites, blogs, social media, and other public information to help it better forecast global events.

In the meantime, In-Q-Tel, the investment firm established by the CIA to support U.S. intelligence agencies, has invested in a startup called Visible Technologies that monitors social media content on the Web so agencies can watch and analyze public opinion on the Web as revealed through social networks.

The DHS, too, has said it monitors Twitter, Facebook, and other popular websites to help it maintain situational awareness and perform its necessary duties in support of international crises and events such as the earthquake in Haiti.

The right forensic tools in the right hands are just a start. The new Digital Detectives issue of Dark Reading shows you how to better apply the lessons they teach. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Jai Krishna Ponnappan
50%
50%
Jai Krishna Ponnappan,
User Rank: Apprentice
2/19/2012 | 11:11:04 PM
re: FBI Seeks Data-Mining App for Social Media
Apart from seeking to use a customized data mining tool they should aim to build intuitive software solutions that evolve incrementally and cyclically based again on proven artificial intelligence technologies. Several large corporations and businesses are already leveraging vital information and value adding intelligence to either boost several of their operations, successfully identify major and minor risk events, understand insider knowledge and predictive trends that were otherwise quiet simply impossible to decipher and even gain a solid competitive advantage. Of course all this can only happen if they can clearly and fully demarcate and know what it is that is the scope of what they want from a tool such as this and unfortunately the power it brings to the table is always open to either misuse or abuse and mixing levels of authority and jurisdiction requires even more stringent and complex measures to ensure appropriate and ethical use. Such systems can prove to be highly beneficial and insightful and the idea behind it has been deployed successfully by several industries all over the globe. There are several areas of application and scenarios particularly within Law enforcement and crime detection where an ethical and acceptable predictive tool can really help assist with better preparedness and responses.

Thank you for the interesting post.

Best Wishes & Regards,
Jai Krishna Ponnappan :)
Bprince
50%
50%
Bprince,
User Rank: Ninja
1/28/2012 | 3:52:47 AM
re: FBI Seeks Data-Mining App for Social Media
Lots of evidence street gangs are using Facebook, YouTube, etc, to promote their gangs and in some cases discuss crimes, and I just saw a story about people firing guns at a t-shirt of Obama and putting it on Facebook. Needless to say, they are now under investigation.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.