US SOCOM and The Special Forces to Scrutinize Social media

US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information.

Exactly two years ago I wrote about the use of social media in the Military. I explained why social media platforms represent a powerful instrument for activities operated by governments and intelligence agencies.

Modern social media networks are actively used by governments worldwide to support military operations including:

  • Psychological Operations (PsyOps).
  • OSInt researchers.
  • Cyber espionage campaigns.
  • Offensive attacks.

Despite the large use of social networks, only recently the U.S. SOCOM (Special Operations Command) admitted in recent Congressional hearings that the exploitation of these platforms is becoming a formal methodology.

The result is that intelligence agencies and law enforcement are using and looking for a new generation of tools and custom software for a more effectively crawling of social media platforms.

The US military is investing to train SOCOM personnel to use these tools and adopt best practices to search for information of interest and handle them in the proper way.

According to a report published on the Strategy Page, the use of social network could be very effective in the fight of the Islamic terrorist activity.

“This will involve using the cultural and language skills of Special Forces operators to more effectively seek out and evaluate terrorist threats. The Special Forces have one of the largest collections of experienced counterterrorism operators who know the culture and languages of areas where there is a lot of Islamic terrorist activity.” states the Strategy Page.

Despite groups of terrorists like the ISIS are advising their members to use social media in a secure way, young militants and non-expert followers could provide sensitive information to the SOCOM personnel.

US military is investing a great effort in learning about cultures and languages of potential threat actors, Special Forces are providing significant insight and training for forces operating in risky areas, and this is possible also thanks to the analysis of social media.

“The CIA developed software to gather all this Internet information, filter and organize it and then turn it over to analysts to be sorted out, or, in many cases, translated more accurately. That last bit was necessary because machine translation software can automatically translate all those tweets and postings so that stuff can be identified and put in a database. But in order to get really useful (to the CIA) intelligence you need skilled linguists and analysts to double check and also find out if the selecting and sorting software needs to be tweaked (it often does).” continues the Strategy Page.

Social networking platforms represent a privileged source of information for the intelligence worldwide, the analysis of metadata extracted by social media could allow agents to track also Facebook users that are using pseudonyms to remain hidden.

Social media platforms represent a privileged communication carrier for groups of terrorists so it’s normal that the Intelligence agencies will develop tools and methodologies to monitor them and uncover the activities of criminals and terrorist.

Pierluigi Paganini

(Security Affairs –  social media, US SOCOM)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts warn of an ongoing malware campaign targeting WP-Automatic plugin

A critical vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and…

15 hours ago

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

17 hours ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

17 hours ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

20 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

22 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

1 day ago

This website uses cookies.