Can the US military fight a war with Twitter?
New projects could bring about a change in the way intelligence is gathered
IDG News Service - Students at a military graduate school in California are mining social media with new methods that may change the way the armed forces collect intelligence overseas.
Students and researchers at the Naval Postgraduate School have tackled two projects that could begin the shift in the way intelligence is gathered. The first is a piece of software they wrote that harnesses the Twitter API (application programming interface) and the second is a project focusing on Syria that uses social networks to look at U.S. policy options there, though civil liberties experts say the technology concerns them.
The software for Twitter, called the Dynamic Twitter Network Analysis (DTNA), is now being field-tested by three Defense Department units overseas to help gauge public opinion in some of the world's hot spots.
The software pulls in data from the public Twitter feed, then sorts it, live, by phrases, keywords or hashtags. The program is continuously updated, integrating a mapping feature and geo-tagged information. Intelligence officers could use DTNA to understand people's moods about a topic, or hopefully prevent or simply respond faster in any future U.S. embassy attacks.
The group's second project incorporates the DTNA software but also pulls in public information from Facebook, YouTube, Google and other sources to protect potential weapon-of-mass-destruction sites in Syria while the conflict there continues.
The Syria project is spearheaded by an intelligence officer getting his master's degree at the school.
Army Major Seth Lucente set out to analyze Syria with social media because of the U.S. plan to keep from entering the Syrian civil war unless chemical weapon stockpiles are exposed to danger. That goal was spelled out by President Barack Obama in August and sparked Lucente's idea for the project. (You can watch a video of the speech here.)
The methodology Lucente and researchers are using is called sentiment analysis. It's been around for about 10 years and is used primarily by consumer-facing companies to pull public information on social media streams and analyze it for trends. This is the first known use of sentiment analysis by the military.
"In the commercial world, everyone is doing it," said Bing Liu, a computer science professor who works on sentiment analysis and data mining at the University of Illinois at Chicago. "I'm not aware of work in the military. But I'm sure they're using it."
Lucente says that was exactly the problem; intelligence methods are more antiquated than that. The military's standard intelligence-collection techniques still tend to mimic those of the Cold War, with satellite imagery and agents deployed to locations to collect information. Depending on the difficulty in accessing locations or groups, it can take a year or more to corroborate information. When analyzing mood, he says those steps simply take too long.
- Social Media in Technology: A Unified Strategy for Success Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Social Media White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!