You are previewing Using Social Media for Global Security.
O'Reilly logo
Using Social Media for Global Security

Book Description

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!

During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, and globally--and cost-effectively. Authored by two technology/behavior/security professionals, Using Social Media for Global Security offers pages of instruction and detail on cutting-edge social media technologies, analyzing social media data, and building crowdsourcing platforms.

The book teaches how to collect social media data and analyze it to map the social networks of terrorists and sex traffickers, and forecast attacks and famines. You will learn how to coalesce communities through social media to help catch murderers, coordinate disaster relief, and collect intelligence about drug smuggling from hard-to-reach areas. Also highlighting dramatic case studies drawn from the headlines, this crucial book is a must-read.

  • Illustrates linguistic, correlative, and network analysis of OSINT

  • Examines using crowdsourcing technologies to work and engage with populations globally to solve security problems

  • Explores how to ethically deal with social media data without compromising people's rights to privacy and freedom of expression

  • Shows activists fighting against oppressive regimes how they can protect their identities online

If you're responsible for maintaining local, national or global security, you'll want to read Using Social Media for Global Security.

Table of Contents

  1. Cover
  2. Part I: Understanding the Influence of Social Media Globally
    1. Chapter 1: Understanding Social Media's Impact on Global Security
      1. Organizing Revolutions and Riots
      2. Recruiting Terrorists and Encouraging Attacks
      3. Glorifying and Promoting Gang Culture and Violence
      4. Acknowledging Social Media's Impact
      5. Summary
      6. Notes
    2. Chapter 2: Understanding Global Social Media Use
      1. Defining Social Media
      2. Grasping Social Media's Popularity and Appeal
      3. Social Media Technologies
      4. Summary
      5. Notes
  3. Part II: Analyzing Social Media Data to Solve Security Problems
    1. Chapter 3: Introduction to Social Media Analytics
      1. Defining Analysis
      2. Analysis Overview
      3. Analysis Methodologies
      4. Summary
      5. Notes
    2. Chapter 4: Collecting and Managing Social Media Data
      1. Understanding Social Media Data
      2. Determining Collection Needs
      3. Collecting the Data
      4. Filtering the Data
      5. Storing and Managing the Data
      6. Third-Party Solutions
      7. Summary
      8. Notes
    3. Chapter 5: Mapping and Analyzing Social Networks
      1. Key Concepts and Definitions
      2. Choosing SNA Software Program
      3. First Example–Identify Influencers
      4. Third Example–Determine Top Memes
      5. Summary
      6. Notes
    4. Chapter 6: Understanding and Forecasting Events
      1. Introduction to Analyzing Events
      2. Understanding Forecasting
      3. Conducting Language and Sentiment Analysis
      4. Correlation and Regression Analysis
      5. Volumetric Analysis
      6. Summary
      7. Notes
  4. Part III: Crowdsourcing Intelligence, Solutions, and Influence
    1. Chapter 7: Introduction to Crowdsourcing
      1. What Is Crowdsourcing?
      2. Why Use Crowdsourcing?
      3. Relevant Examples of Crowdsourcing
      4. Knowing When to Crowdsource
      5. Summary
      6. Notes
    2. Chapter 8: Building and Running Crowdsourcing Platforms
      1. Overview of the Process
      2. Select Objective and Scope
      3. Analyze the Target Audience and Media Environment
      4. Design the Platform
      5. Build the Platform
      6. Market the Platform
      7. Manage the Platform
      8. Measure the Platform's Performance
      9. Wash, Rinse, Repeat
      10. Summary
      11. Notes
    3. Chapter 9: Crowdsourcing Intelligence
      1. Understanding the Scope of Crowdsourced Intelligence
      2. Appreciating the Limits of Crowdsourcing Intelligence
      3. Tweaking the Process for Intelligence Collection Platforms
      4. Collect Intelligence from Hard-to-Reach Areas through SMS
      5. Collect Intelligence from the Community for Law Enforcement
      6. Collect Intelligence to Bolster Disaster Relief
      7. Summary
      8. Notes
    4. Chapter 10: Crowdsourcing Solutions
      1. Understanding the Scope of Crowdsourced Solutions
      2. Appreciating the Limits of Crowdsourcing Solutions
      3. Tweaking the Process for Solution Platforms
      4. Crowdsourcing Translations during Disaster Relief
      5. Crowdsource Tools to Identify Antagonistic Actors in Video Feeds
      6. Summary
      7. Notes
    5. Chapter 11: Influencing Crowds
      1. Understanding the Scope of Influencing through Crowdsourcing
      2. Process of Influencing Others
      3. Appreciating the Limits of Influencing Crowds
      4. Tweaking the Process for Influence Platforms
      5. Influencing to Collect Intelligence on Corrupt Officials
      6. Summary
      7. Notes
  5. Part IV: Broadening Your Horizon
    1. Chapter 12: Advanced and Emerging Analytical Methodologies
      1. Expanding the Scope of Analysis
      2. Cluster Analysis
      3. Geo-Spatial Network Analysis
      4. Agent Modeling
      5. Summary
      6. Notes
    2. Chapter 13: Delivering Services through Crowdsourcing
      1. Delivering Education
      2. Delivering Health
      3. Summary
      4. Notes
    3. Chapter 14: Protecting Privacy and Yourself
      1. Considering Privacy and Free Speech
      2. Acting Legally and Ethically
      3. Protecting Your Identity and Speech
      4. Summary
      5. Notes
  6. Appendix: Extra Information and Resources
    1. Social Media Platforms
    2. Software Tools
  7. Introduction