CIA Admits It Monitors, Analyzes Facebook, Twitter

As always support social networks are now the ideal carrier for an abnormal amount of information and this is the main reason why many governments have invested and are investing in sophisticated analysis tools that can implement intelligent search within an ocean seemingly unrelated data.

An unit part of the CIA’s Open Source Center is responsible for monitoring the vast and various social networks, local and international news, radio, and television, Internet chat rooms, and pretty much anything from which they can procure intelligence.

Their goal is to monitor every facet of the internet in every imaginable language, cross-referencing that information with local news reports and information gleaned in the more traditional, cloak-and-dagger, spy-type espionage. Much of the information,according to the AP, ends up in the hands of White House officials and even in President Obama’s daily intelligence briefings.

One of the main problems that I was placed when we talked about systems analysis is themassive cost of these technologies and the relative maturity.

On the second point I never had doubts, because the available technologies allow similaranalysis without problems, while there was some concern about funding availability.

But when government agencies come into play even this threshold is exceeded in the lightof their budget.

What are the plausible scenarios? Government agencies that monitor the sentimentshared by these powerful channels. We are really interested in preventive actions or do we want to indoctrinate new ideologies?
The dangers are real, we will continue monitoring action but be careful not to go further, the pace is really short.

More details on Threat Post web site

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.