FBI Turns To Social Media To Track Shooters

US President Donald Trump has said "more has to be done" to prevent mass shootings following the El Paso attack and another in Ohio where nine people were killed.  

The Federal Bureau of Investigations aims to acquire access to a “social media early alerting tool” that will help monitor how terrorist groups, foreign intelligence services, criminal organisations and other domestic threats use networking platforms to further their illegal efforts.

“With increased use of social media platforms by subjects of current FBI investigations and individuals that pose a threat to the United States, it is critical to obtain a service which will allow the FBI to identify relevant information from Twitter, Facebook, Instagram, and other Social media platforms in a timely fashion,” the agency said in a statement.

“Consequently, the FBI needs near real-time access to a full range of social media exchanges in order to obtain the most current information available in furtherance of its law enforcement and intelligence missions.”

Tthe proposal comes at a time when US society is growing accustomed to the painful reality of the weaponisation of social media outlets to cause harm. Earlier this year, a mass shooter in New Zealand opened fire at two mosques killing 50 people and injuring many more, he posted a 74-page manifesto and images of his weapons online ahead of the attack and live streamed the shooting directly on Facebook Live. 

The shooter who killed three people at the Gilroy Garlic Festival in California recently also previously posted online about an 1890 racist manifesto, which has been deemed a “staple among neo-Nazis and white supremacists on extremist sites.”

“It is an acknowledged fact that virtually every incident and subject of FBI investigative interest has a presence online,” the bureau said in the project’s statement of objectives. 

“The mission critical exploitation of social media enables the Bureau to proactively detect, disrupt, and investigate an ever growing diverse range of threats.”

The FBI ultimately wants an interactive tool that can be accessed by all headquarters division and field office personnel via web browsers and through multiple devices. Interested vendors should have the capabilities to offer the agency the ability to set filters around the specific content they see, send immediate and custom alerts and notifications around “mission-relevant” incidents, have broad international reach and a strong language translation capability and allow for real-time geolocation-based monitoring that can be refined as events develop. 

Concernimg specific persons-of-interest and suspects already involved in open investigations, the bureau wants the ability to obtain their full-scope social media profiles from across the various platforms and insights into their affiliations with various groups across the world wide web.

“Items of interest in this context are social networks, user IDs, emails, IP addresses and telephone numbers, along with likely additional account with similar IDs or aliases,” the agency said. The firm-fixed-price contract will be awarded on a best-value basis and will include one base year and four one-year option periods. 

DefenseOne:      BBC: 

You Might Also Read:

Cyber Terrorism & Piracy:

How Computer Data Helped Investigate Quebec Shooter:


 

« IBM X Force Dissect The Destructive Power Of Malware
UK Power Outage - The Cyber Effect? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Zivver

Zivver

Zivver is the effortless, secure email platform, powering the next generation of secure communications.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Kasada

Kasada

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

Patriot Consulting Technology Group

Patriot Consulting Technology Group

Patriot Consulting's mission is to help our clients manage cybersecurity risk through secure deployments of Microsoft 365.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.