Can the US military fight a war with Twitter?
New projects could bring about a change in the way intelligence is gathered
IDG News Service - Students at a military graduate school in California are mining social media with new methods that may change the way the armed forces collect intelligence overseas.
Students and researchers at the Naval Postgraduate School have tackled two projects that could begin the shift in the way intelligence is gathered. The first is a piece of software they wrote that harnesses the Twitter API (application programming interface) and the second is a project focusing on Syria that uses social networks to look at U.S. policy options there, though civil liberties experts say the technology concerns them.
The software for Twitter, called the Dynamic Twitter Network Analysis (DTNA), is now being field-tested by three Defense Department units overseas to help gauge public opinion in some of the world's hot spots.
The software pulls in data from the public Twitter feed, then sorts it, live, by phrases, keywords or hashtags. The program is continuously updated, integrating a mapping feature and geo-tagged information. Intelligence officers could use DTNA to understand people's moods about a topic, or hopefully prevent or simply respond faster in any future U.S. embassy attacks.
The group's second project incorporates the DTNA software but also pulls in public information from Facebook, YouTube, Google and other sources to protect potential weapon-of-mass-destruction sites in Syria while the conflict there continues.
The Syria project is spearheaded by an intelligence officer getting his master's degree at the school.
Army Major Seth Lucente set out to analyze Syria with social media because of the U.S. plan to keep from entering the Syrian civil war unless chemical weapon stockpiles are exposed to danger. That goal was spelled out by President Barack Obama in August and sparked Lucente's idea for the project. (You can watch a video of the speech here.)
The methodology Lucente and researchers are using is called sentiment analysis. It's been around for about 10 years and is used primarily by consumer-facing companies to pull public information on social media streams and analyze it for trends. This is the first known use of sentiment analysis by the military.
"In the commercial world, everyone is doing it," said Bing Liu, a computer science professor who works on sentiment analysis and data mining at the University of Illinois at Chicago. "I'm not aware of work in the military. But I'm sure they're using it."
Lucente says that was exactly the problem; intelligence methods are more antiquated than that. The military's standard intelligence-collection techniques still tend to mimic those of the Cold War, with satellite imagery and agents deployed to locations to collect information. Depending on the difficulty in accessing locations or groups, it can take a year or more to corroborate information. When analyzing mood, he says those steps simply take too long.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- 5 Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce
- Learn how Citrix solutions helped 5 companies realize the full value of desktop virtualization through a project-by-project approach based on key business priorities.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
- Regain control and reduce risk without sacrificing business productivity and growth
- IDC MarketScape: Worldwide Client Virtualization Software 2013 Vendor Assessment
- IDC has placed Citrix in the 2013 IDC MarketScape Leaders Category once again noting that, "Citrix's position reflects the company's market leadership and...
- Infographic: Top Use Cases for Desktop Virtualization
- A wide range of business issues is driving IT toward desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their entire... All Government IT White Papers
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- All Government IT Webcasts