
Background
Many businesses use social media monitoring to detect potential security vulnerabilities, reputational risks, and derogatory information regarding their organization and personnel. Social media platforms host millions of users who post content daily. This data presents a valuable resource for real-time data analysis. Diligently tracking this data allows an organization to respond promptly to potential threats and enhance overall security measures.
Situation
An educational institution engaged Integras Intelligence to provide social media monitoring services and supplement their internal team when further investigation is required. During a routine review of social networks, we identified what appeared to be a credible bomb threat.
Solution
Our team immediately advised the client and initiated efforts to identify the individual behind the post. The client informed the necessary people, including law enforcement, and adjusted their security.
Meanwhile, the threatening post was deleted shortly after it was posted, which underscores the importance of social media monitoring as a proactive strategy. Without active monitoring, this potential threat could have led to disaster.
Our investigation determined that the username associated with the threat did not correspond to any specific person. Additional research into the account activity revealed interactions between the subject of interest and someone we could identify. Further research into this second individual revealed an association with our client, whom we notified right away.
Based on our recommendation, the client interviewed this individual, who was familiar with the person who posted the threat. The client notified law enforcement and filed a police report. Two days later, the individual was arrested for terroristic threats.
Conclusion
This example shows the importance of proactive security. Finding the social media post in real-time launched an immediate investigation and ultimately led to a successful conclusion. Some social media monitoring services send email notifications—without supporting analysis—when red flags appear, which places the responsibility on the client. Unfortunately, these alerts can slip through the cracks due to sheer volume, and serious threats can be missed.
Working in tandem with your investigative partner can mean the difference between success and failure, especially in critical situations. Such relationships can take time to develop. Learn how to cooperate before an emergency arises.
Finally, don’t rely solely on law enforcement. Many police departments are short-staffed and overworked. In this case, law enforcement did not even investigate the threat after it was initially reported.
Please contact us at info@integrasintel.com to discuss how social media monitoring can enhance your security and risk management program.
One Response
Thank you