Social Media Threat Intelligence: Sources To Watch

Online public-facing content is growing exponentially. And, while most of this data is benign, some online hubs contain critical information for the safety and security of individuals and organizations. In order to develop an effective intelligence strategy, analysts and security teams must be pulling information from this vast quantity of data. The question is, which social media networks should you be monitoring? For organizations to protect themselves against internal and external threats, speed-to-information is key. The most effective security strategies involve gathering, filtering, and analyzing data faster.

arial view blur people

Open source intelligence (OSINT) refers to information discovery via public data sources for a specific purpose. Security professionals use OSINT to help protect assets, prevent loss, expose fraud, detect data breaches and criminal activity, and ensure the safety of their team and customers. 

New call-to-action

So, where should you look for open source intelligence? With so many networks to cover, data aggregation platforms like Echosec have become essential tools for data discovery and threat intelligence. Basically any place where people go to connect and communicate is a place for potentially malignant behaviour. In this post, we’re outlining the networks that should definitely be on your data sources checklist, and why.

Note: this is just a sampling of the sources Echosec Systems has access to. For a complete list of sources, contact us

Micro-Blogging, Photo, and Video-Sharing Networks

Most networking platforms are simple to use and accessible to anyone with an email address. They are rich data sources for OSINT discovery, utilized by artists, businesses, content creators, and people just wanting to connect and socialize.

Photo and Video-Sharing Networks

smartphone photo crowd blur street

Sourcing photo and video content can help security professionals gain situational awareness through the eyes of users on the ground during events, at certain locations, or during disasters.

Social media monitoring and how to gather intelligence from open source data   <https://cta-redirect.hubspot.com/cta/redirect/3409664/be8d8030-7477-4091-84b2-1570416bf170>

Message Boards and Online Discussion Forums

Message boards and online discussion forums are used by people wanting to connect, learn or discuss topics. Within these platforms, there is ample opportunity for destructive behaviour and criminal collaboration, planning, and strategizing. Security and safety teams have been able to predict events or activities before they occur by monitoring online discussions.

Social Journalism and News Aggregation Platforms

laptop hands desk

When developing an effective and well-rounded security protocol, it’s important to keep tabs on what’s happening in the world. Aggregating news sources can help you gain perspective when predicting and analyzing behaviour as well as getting alerts and gathering information on specific locations, current events, trends, and communities

New call-to-action

Where you look for information depends on what you want to find. Performing a basic surface web search through a platform like Google will return a relatively broad list of hits. There is an enormous amount of publicly available data out there. In order for any of it to be useful for threat intelligence, it must be aggregated and filtered quickly and directly from the sources themselves. 

 

Discover how Echosec can find, filter, and deliver open source intelligence for you and your team.

BOOK A DEMO

 

THE INTEL

Quarterly updates, news and opinion
GET THE INTEL

READ MORE

New call-to-action
New call-to-action
New call-to-action
PROTECTING PEOPLE, LOCATIONS, ASSETS
New call-to-action