Open Source Intelligence (OSINT) and Social Media Intelligence (SOCINT) have become critical components in the toolkit of law enforcement agencies. Understanding the strengths and limitations of these vast reservoirs of data is key to harnessing them effectively in law enforcement scenarios.
A systematic introduction to OSINT and SOCINT can provide a useful basis for law enforcement personnel and agencies that are not yet maximizing the potential of these new resources.
OSINT and SOCINT: A Detailed Overview
First, let’s establish what these respective terms mean.
- OSINT: Open source intelligence is the collection and analysis of publicly available information for intelligence purposes, ranging from datasets and reports to website and social media content.
- SOCINT: Social media intelligence is more narrowly focused, SOCINT analyzes patterns and trends from social media platforms to gain insights into behavior patterns, relationships, and potential criminal activities.
Open source intelligence, then, can be thought of as the entire body of information that is available to the public at large; and not classified by a government agency, regulated by law, or otherwise privileged.
Social media intelligence is a subset of open source intelligence, recognizing these popular platforms as a place where criminals and law-abiding citizens alike interact with each other, share details of their lives and opinions, and – in so doing – frequently divulge more than they realize.
All SOCINT is also OSINT, but OSINT goes well beyond social media. Data sources compiled by OSINT tools may also include government databases, commercially collected consumer information, property records and more.
The Strengths and Weaknesses of OSINT and SOCINT
Every resource has its strengths and weaknesses, and OSINT and SOCINT are not exceptions to this broad rule.
Strengths of OSINT and SOCINT
- Accessibility: OSINT is open and public by definition, and so it’s accessible and as easy as any internet search. No warrants are required, no liaison with other agencies, and minimal administrative overhead.
- Volume: The sheer volume of data available requires no explanation. Though, this can also be a weakness of OSINT, as discussed in the next section.
- Transparency: Data drawn from public sources provides investigations with an innate degree of transparency and accountability. Public data, by definition, is in the public realm and can be vetted by investigators, journalists or members of the public.
- Cost-effectiveness: Because OSINT and SOCINT can be found even through ordinary internet searches, the barrier to entry is low enough even for small LEAs with minimal staffing. Budget constraints and a lack of specialized training need not be obstacles to intelligence gathering.
Weaknesses of OSINT and SOCINT
- Volume: The sheer volume of data available. While this is also a strength, finding meaningful, actionable intelligence in the sea of raw information is a daunting challenge.
- Data quality: The quality of information found online is often questionable, and typically requires verification from additional sources.
- Anonymity: Online posts are often anonymous or pseudonymous, and connecting them to specific groups or individuals can be challenging.
- Segmentation: The internet is not a single monolith, and pertinent information may be spread across multiple pages, platforms or databases.
- Legal constraints: It is possible for investigators to fall afoul of privacy laws, even with data drawn from public sources, depending how that data is used or aggregated.
OSINT Tools and Data Sources for Law Enforcement
The primary challenge with open source intelligence, then, lies in effectively managing and analyzing the vast amounts of data available. This makes the need for advanced OSINT and SOCINT tools critical.
Tools such as Maltego, OSINT Framework, and Intel471 are all widely used by law enforcement, and each has its niche. Maltego is adept at drawing the connections between websites, for example, and identifying the people or organizations behind them. Intel471 focuses on cybercrime and threat detection. OSINT Framework, as its name suggests, provides a convenient central hub where investigators can find a range of OSINT tools for specific tasks.
A very different approach to data is offered by vendors that draw on regulated data, which is protected by law because of its unusual sensitivity. Data from sources such as these provides a valuable tool for cross-checking the accuracy of OSINT data.
Balancing Open Source and Regulated Data
Combining OSINT and regulated data sources, as well as information from existing law enforcement databases and information-sharing partnerships, can yield great results. When investigators are successful in these attempts at synthesis, the end result can provide both a broad perspective and specific insights.
Major open-source tools such as Maltego and Intel471 can be integrated with sources of regulated data through the use of specialized programming tools . Any LEA large enough to have an in-house IT team, or with the budget to use outside consultants as needed, can build on those programming tools to give investigators access to both streams of data through either vendor’s interface.
Spokeo for Business takes a different tack, drawing on both OSINT and regulated data and then presenting a unified report. Though it already integrates both types of data, its application programming interface (API) can be leveraged to integrate data from other unregulated sources (though a regulated source API is currently being developed).
Best Practices in OSINT and SOCINT Utilization
The strengths and limitations of OSINT and SOCINT determine best practices in their use and deployment. LEAs just embarking on the use of OSINT in investigations, or wishing to improve and codify existing ad hoc methodologies, will need to integrate those best practices within the framework of existing departmental policy.
A few examples of best practices include:
- Choosing OSINT tools that address specific, known gaps in your agency’s current intelligence-gathering.
- Refining data collection strategies in order to maximize the value of the intelligence your new tools provide.
- Using automated reporting features to inform further, manual searches or monitoring. While these tools are powerful, there’s still no substitute for the active attention of a human investigator.
- Validating and cross-referencing information provided by OSINT or SOCINT tools, to verify its accuracy.
- Maintaining oversight and accountability over OSINT use, including searches performed and the use of the data they yield, for audit and compliance purposes.
Real-World Law Enforcement Applications for OSINT
While OSINT and SOCINT are broadly applicable to law enforcement as a whole, it’s useful to consider a few specific use-cases where judicious use of these tools can streamline and empower day-to-day policing tasks.
Skip Tracing
OSINT and SOCINT can enhance the efficiency and success rate of locating individuals, through insights gleaned from their digital footprints. Specific examples might include:
- Locating fugitives
- Identifying potential witnesses to incidents, by their social media posts or physical proximity to the scene
- Establishing contact when information received is incomplete, illegible, or recorded incorrectly
- Identifying individuals who have existing connections to a person of interest, and may be able to lead investigators to that person
Criminal Investigations
OSINT and SOCINT can play a crucial role in criminal investigations, especially when time constraints limit the usefulness of traditional, in-person investigation and interviews. Specifically, these tools can aid in:
- Gathering information on suspects or persons of interest, such as known associates, their physical appearance, and places they frequent.
- Evidence gathering, with witness videos on social media playing an especially helpful role.
- Suspect tracking, through location data on their social media posts or mentions of the person of interest in others’ posts.
- Locating direct admissions of guilt, or incriminating details in photos, videos or text posts, from suspects.
Counterterrorism and Threat Detection
OSINT and SOCINT can also play a fundamental role in tracking and analyzing potential threats, at all levels from local to national. Potential terrorists, extremist groups, hackers, gangs and other threats that go beyond the level of ordinary street crime may sometimes show a shaky grasp of operational security, leaving traces of their activities and recruiting online.
Conclusion: OSINT Tools can Play a Key Role in Law Enforcement
When effectively harnessed, OSINT and SOCINT provide invaluable insights that enhance law enforcement operations. Understanding the nature, strengths, and weaknesses of these new tools is a necessary prerequisite to deploying them effectively.
With that understanding in place, law enforcement professionals can integrate OSINT tools into their existing strategies, improving outcomes in criminal investigations, community policing, and other areas of law enforcement.
This article is one of a series outlining the potential for OSINT within law enforcement. To learn more about the applications of OSINT and SOCINT tools, continue Spokeo Pathfinder’s guide to Integrating Open Source Intelligence.
If you’re ready to see how Spokeo for Business can streamline your department’s data gathering, reach out today via this link to begin your free trial.
About the author: Stephen Henderson Jr:
For more than 30+ years, Stephen Henderson Jr. has worked and held senior positions for both Fortune 500, startup and Business Process Outsourcers. Prior to becoming the Client Services Manager of Spokeo’s Law Enforcement & Government Division, Stephen Henderson, Jr. served as an exceptional intelligence and law enforcement officer for over two decades, including as full time Dignitary Protection for the former US Ambassador to Spain as well as at the Fullerton Police Department and Orange County Sheriff’s Department. He honorably retired from public service in May 2018 with the rank of Reserve Lieutenant. Today, Henderson Jr. leverages this brackground to lead Spokeo’s efforts to accelerate new growth and provide real value to the buisnesses that rely on Spokeo’s data for mission-critical operations.
Sources:
AFCEA: The Rise of OSINT: Few Rules, Many Opportunities
Squire Patton Boggs: Overview of Privacy & Data Protection Laws: United States
Bureau of Justice Assitance: Real-Time and Open Source Analysis (ROSA) Resource Guide
Police1: Using WEBINT and OSINT to Tackle Extremist Groups