Information Warfare: Weaponizing Facebook And Twitter

U.S. SOCOM (Special Operations Command) has increasingly depended on commercial technology to gain an edge in battle. This has paid off as Islamic terrorists have moved some of the combat to the Internet, which they use for recruiting, fund raising, training and carrying out attacks or for defense. SOCOM is now turning to commercial Internet marketing software systems to better (and more quickly) analyze what Islamic terrorists are doing on the Internet. This is nothing new for SOCOM, which has been informally using social networking sites and Internet activity in general to find, monitor and sometimes manipulate terrorist suspects. This has been going on since the late 1990s but as time went on SOCOM found that formal and analytic techniques produced better results.

For years SOCOM has also been developing custom software for training SOCOM personnel on how best to handle potentially useful information. This capitalized on using the cultural and language skills of Special Forces operators, something the commercial software products paid less attention to. The Special Forces has one of the largest collections of experienced counter-terrorism operators who know the culture and languages of areas where there is a lot of Islamic terrorist activity. These soldiers have spent years learning about cultures and languages and honed that knowledge by actually operating in those areas. This is now being used to develop rapid analysis of Internet data (discussion topics, direction of discussions, traffic analysis) and quickly determining how to respond. Many people do not realize that SOCOM had always had lots of psychological war specialists and they have set up local message centers staffed with locals who can start posting new types of messages in response to detected trends. What SOCOM is seeking is to derail Islamic terrorists propaganda (especially the ones involving mass murder or beheadings of civilians) and capitalizing on it to mobilize local (where the Islamic terrorists operate) public opinion against these atrocities.

Another favorite type of software SOCOM develops for its own use is mission planning systems. This greatly reduces the time needed to plan a complex mission, especially one involving air transportation, electronic warfare and a constantly changing situation with the enemy. In addition to combat missions, most of the time Special Forces are usually there for advising and training local forces in their own language and with a knowledge of local languages. The CIA has long seen Special Forces as a primary source of expert analysts and field operatives. Now these analysis tools and techniques are more frequently being used to interfere with Islamic terrorist social media activities. Because Islamic terrorists groups are independent (and often hostile to) each other, they never know who is really responsible for SOCOM “disruption” efforts. All they know is that some things are not working as well as they used to. This is a classic military technique of exploiting an enemy weakness.

Social networking sites and Internet activity has long been a major source of information for intelligence and police agencies. There is an irony in this because sites like Facebook, Snapchat and Twitter are also hailed as catalysts for revolution and social change. While that’s true, these sites have also been a big help to those seeking to detect and prevent criminal behavior. This can have fatal consequences in dictatorships, where the police and intel groups can use data gathering and analysis tools (developed for marketing via the Internet) to find people who are protesting or rebelling against the government. Even if these Facebook users are using codes and pseudonyms to remain hidden, the scanning and analysis tools can often uncover them. Twitter traffic can also be analyzed for useful information on who is doing what and where they are.

Social networking sites are thus a double edged sword. They can be used to organize, inform, and mobilize large groups. But in doing this you provide the secret police a lot of information you would rather not share with them. Islamic terror groups advise their members to avoid social networking sites, but that has proved hard to enforce. Social networking was designed to be alluring, as well as useful, especially to the young. For young revolutionaries, this can be a fatal attraction.

Intelligence agencies, especially in the United States, were quick to adopt commercial techniques used for BI (Business Intelligence, or corporate espionage) and data mining operations and applying it to the massive quantities of real time data on the Internet. The CIA developed software to gather all this Internet information, filter and organize it and then turn it over to analysts to be sorted out, or, in many cases, translated more accurately. That last bit was necessary because machine translation software can automatically translate all those tweets and postings so that stuff can be identified and put in a data base. But in order to get really useful (to the CIA) intelligence you need skilled linguists and analysts to double check and also find out if the selecting and sorting software needs to be tweaked (it often does).

This massive, real-time combing of social media and open (to anyone) message traffic has yielded a much more accurate and timely analysis of political, religious, cultural, and military trends worldwide. It has also made the deployment of agents and other scarce resources (reconnaissance and electronic eavesdropping satellites, aircraft, and ships) more effective.

The FBI, Homeland Security, and military intelligence have similar data gathering and analysis systems for gathering all sorts of useful information. Other nations are establishing similar systems, often using commercial software sold to marketing firms and large corporations.


The article was originally published on StrategyPage.com. Republished here with the permission of the author.

Leave a Reply