Blog

What is Social Data? Redefining the Term for Enhanced Security

Broadening your perception of what constitutes social data is the first step toward a holistic strategy. This is true whether you are assessing information environments or providing physical security.

Default Author Image
October 14, 2021

Social data is defined as publicly available information shared by social media users. This includes their location, language, and the content they share. Gathering social data is now a common practice for many applications. These range from marketing to physical and digital security.

However, social activity is diversifying across the surface, deep, and dark web. Valuable social data is widely available on sources you might never have associated with the term social media. Conflating social data with only mainstream networks is an outdated approach.

Assessing Geopolitical Risk

Whitepaper: How OSINT tools can address current intelligence challenges

What is the New Definition of Social Data for Security Teams?

Social media and social data are actually harder to define than you might think. According to a 2017 big data research review,

“…[a] majority of related work on [big social data] is focused on the analysis of social data, giving less attention to describing what [it] actually is. This can lead to lack of consensus, inconsistency, and vague understanding of what such data could be used for.”

For most, social media means a collection of popular websites and apps used to facilitate social interaction online—sites including:

  • Social networks like Facebook and LinkedIn
  • Photo and video-sharing networks like Instagram, YouTube, and Pinterest
  • Interactive media networks like Snapchat and TikTok
  • Microblogging sites like Twitter and Tumblr

But if we define social media as online technology that enables social interaction, networking, and the exchange of ideas and information, the variety of social data sources gets a lot broader. Beyond popular social media sites, social data then also includes surface, deep, and dark web networks where users exchange publicly available content. 

This covers:

  • The deep web and dark web, including forums, imageboards, and less-regulated social media sites. Deep and dark web content is unindexed and thus undiscoverable by standard search engines like Google. These web spaces contain sites like 4chan, Gab, and other low-profile forums.
  • Paste sites, like Pastebin and DeepPaste. Paste sites are used to publicly share blocks of plain text in posts known as “pastes.” 
  • Decentralized networks like Mastodon. These social networks are hosted on distributed servers to evade content policies and takedowns prevalent on more mainstream networks.
  • Messaging apps like Telegram.
  • Regional social networks. If you’re consuming social data in the Western world, popular social networks in other regions—like Naver (South Korea) or Sina Weibo (China)—are probably not on your social data radar.

Even though these sources may be harder to access, have a smaller user base, or host different content types than mainstream social media, they still make up an important—yet often overlooked—piece of the social mediaverse.

Why Redefine “Social Data?”

Why does it matter whether you expand your definition of social data?

As an everyday social media consumer, it might not matter. But if you use public social data in a professional environment, reconsidering which sources fall under the umbrella of social media could make a huge difference to your operations.

Let’s take security applications, for example. If your team protects facilities, social data from networks like Twitter are valuable for detecting physical security threats like natural disasters or shootings. Mainstream social media has a large user base, so it’s useful for real-time threat detection as bystanders document events.

How Real-Time Social Data is Transforming National Security

How does Social Data Intelligence Improve National Security?

Now imagine that users on a chan site are planning a demonstration or attack near one of your facilities. If you also consider chan sites and other fringe social networks as part of your social data intelligence strategy, your security team could find early warning signals faster than relying on widely-known sources.

Rethinking which sources count as social data is also crucial for global applications like national security. Some of the most widely used social media sites in the world may be unfamiliar to Western intelligence operations. Areas of interest may also block populations from accessing mainstream social media, causing citizens to shift to alternative communication platforms. Without accessing these sources, intelligence teams are likely missing important social data.

Social activity now spans a range of web spaces beyond established social media sites. But search for “social data” in Google, and you’ll find that the term is still synonymous with tech giants.

The Holistic Strategy for Enhanced Security Operations

Honoring this outdated understanding of social data means that professionals consuming this information—like security teams and the public sector—are probably missing out on the context necessary to protect data, assets, and populations.

Including more covert social media—like deep and dark websites and decentralized networks—helps security professionals minimize information gaps and paint a more accurate picture of online social activities. Whether you’re assessing information environments or providing physical security, broadening your perception of what constitutes social data is the first step towards a holistic strategy.

Frequently Asked Questions (FAQs)

What is social data and why is its definition changing?

Social data is publicly available information shared by users online, including their location, language, and shared content. The definition is changing because social interactions are moving beyond mainstream platforms like Twitter or Facebook into “fringe” networks, messaging apps, and deep web forums. To maintain security, organizations must look past traditional social media.

AspectModern Social Data Coverage
MainstreamReal-time event documentation by large public user bases.
Fringe/CovertPlanning of demonstrations or attacks on less-regulated forums.
AlternativeMessaging apps (Telegram) and decentralized networks (Mastodon).

How does social data intelligence help physical security teams?

Physical security teams use social data to detect real-time threats such as shootings, natural disasters, or planned protests. By monitoring both mainstream and fringe social networks, security personnel can identify early warning signals of a physical threat near their facilities much faster than by relying on traditional news or search engines.

  • Geospatial Context: Mapping online discussions to specific physical locations.
  • Real-time Detection: Monitoring bystanders’ posts for immediate local crises.
  • Early Warning: Finding planned events on boards like 4chan or Gab before they occur.

Why is global social media monitoring important for national security?

National security teams must monitor a wide variety of global platforms because mainstream Western sites are often blocked or ignored in specific regions. Citizens in these areas often move to regional social networks or alternative communication platforms to exchange information, making these sources vital for accurate intelligence gathering.

ChallengeSecurity Benefit of Expanded Monitoring
Regional BiasCapturing data from popular local sites unknown to Western users.
CensorshipAccessing alternative platforms used when mainstream sites are blocked.
Information GapsFilling in missing context to paint a complete picture of online activity.

Request a demo today.