Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl


2018 | 10 | 19 | 405-415

Article title

Social Media Intelligence as a tool for immigration and national security purposes



Title variants

Analiza informacji z mediów społecznościowych jako narzędzie wspierające kontrolę bezpieczeństwa w procedurach migracyjnych

Languages of publication



Monitoring Internetu i analiza danych ze źródeł otwartych stanowią istotną część działań antyterrorystycznych o charakterze prewencyjnym. Bogactwo informacji i danych osobowych możliwych do odnalezienia w mediach społecznościowych jest wykorzystywane nie tylko do zwalczania zagrożeń terrorystycznych, lecz także do walki z przestępczością kryminalną. Artykuł opisuje możliwości i zagrożenia związane z potencjalnym wykorzystywaniem tzw. Social Media Intelligence (SOCMINT) w procedurach migracyjnych w celu zagwarantowania bezpieczeństwa wewnętrznego.
Internet monitoring and open source intelligence techniques are becoming an important part of terrorism detection and prevention system. The abundance of personal information in the social media is currently used not only to detect terrorist activities but in ‘regular’ policing as well. The article explores the possibilities of the use of the so-called Social Media Intelligence (SOCMINT) in immigration procedures. Immigration services have unique capability to screen visa applicants in the context of their Internet postings. Such activity may allow to detect serious threats to national security, as well as verify visa eligibility in a more effective manner. However, SOCMINT techniques have their shortcomings which should be addressed in an appropriate internal policy governing their use.








Physical description




  • PhD student, the Faculty of Law and Administration, the University of Warsaw


  • Arslan C., Yanuk M., A New Discipline of Intelligence: Social Media, Istanbul 2015, ICMSS.
  • Benson D.C., Why the Internet is not increasing terrorism, „Security Studies” 2014, nr 23/2, s. 6.
  • Cohen K. i in., Detecting linguistic markers for radical violence in social media, „Terrorism and Political Violence” 2014, nr 26/1, s. 246–256.
  • Dabhi M.D., Geofencing: a generic approach to Real time location based tracking system, „International Journal of Computer Networks and Wireless Communications” 2016, t. 6.
  • Hamm M., Spaaij R., Lone Wolf Terrorism in America: Using Knowledge of Radicalization Pathways to Forge Prevention Strategies, Washington 2015, US Department of Justice.
  • Kaplan A., Haenlein M., Users of the world, Unite!, „Business Horizons” 2010, nr 53/1.
  • Klausen J., Tweeting the Jihad: social media networks of western foreign fighters in Syria and Iraq, „Studies in Conflict and Terrorism” 2015, nr 38.
  • Liaropoulos N., The challenge of social media for the Intelligence community, „Journal of Mediterranean and Balkan Intelligence” 2013, nr 1.
  • Omand D., Bartlett J., Miller C., Introducing Social Media Intelligence (SOCMINT), „Intelligence and National Security” 2012, nr 1.
  • Paullet K., Pinchot J., Cybercrime: the unintentional effects of oversharing information on Facebook, Proceedings of the Conference on Information Systems Applied Research, New Orleans 2012, EDSIG-AITP.
  • Raynes-Goldie K., Aliases, creeping and wall clearing: understanding privacy in the age of Facebook, „First Monday” 2010, nr 1–4.
  • Taleb N.N., Black Swan. The impact of the highly improbable, New York 2007, Random House.
  • Apuzzo M., Schmidt M.S., Preston J., U.S. Visa Process Missed San Bernardino Wife’s Online Zealotry, http://www.nytimes.com/2015/12/13/us/san-bernardino-attacks-usvisa-process-tashfeen-maliks-remarks-on-social-media-about-jihad-were-missed.html?_r=0 [dostęp: 15 IV 2018].
  • Cooke K., US Police used Facebook, Twitter data to track protesters, http://www.reuters.com/article/social-media-data-idUSL4N1CH4J1 [dostęp: 15 IV 2018].
  • Facebook community standards, https://www.facebook.com/communitystandards [dostęp: 15 IV 2018].
  • Facebook, Information for law Enforcement Authorities, https://scontentfra31.xx.fbcdn.net/hphotosxfp1/t39.23656/12532957_530107840495531_2074830868_n.pdf [dostęp: 15 IV 2018].
  • Facebook law enforcement guidelines, 2010, https://info.publicintelligence.net/Facebook2010-2.pdf [dostęp: 15 IV 2018].
  • Full text of Gym Killer’s blog, http://nypost.com/2009/08/05/full-text-of-gym-killersblog/ [dostęp: 15 IV 2018].
  • Google Transparency Report, https://www.google.com/transparencyreport/userdatarequests/#! [dostęp: 15 IV 2018].
  • Hartley-Parkinson R., ‘I’m going to destroy America and dig up Marilyn Monroe’ British pair arrested in the US on terror charges over Twitter jokes, http://www.dailymail.co.uk/news/article-2093796/Emily-Bunting-Leigh-Van-Bryan-UK-tourists-arrested-destroy-America-Twitter-jokes.html [dostęp: 15 IV 2018].
  • http://www.fp7-prime.eu/home_page [dostęp: 15 IV 2018].
  • Ingram D., Facebook says data leak hits 87 million sers, widening privacy skandal, https://www.reuters.com/article/us-facebook-privacy/facebook-says-data-leak-hits-87-million-users-widening-privacy-scandal-idUSKCN1HB2CM [dostęp: 15 IV 2018].
  • Milmo C., Iraq crisis exclusive: Isis jihadists using World Cup and Premier League hashtags to promote extremist propaganda on Twitter, http://www.independent.co.uk/news/world/middle-east/iraq-crisis-exclusive-isis-jihadists-using-worldcup-and-premier-league-hashtags-to-promote-9555167.html [dostęp: 15 IV 2018].
  • Ministerstwo Spraw Zagranicznych RP, System eKonsulat, https://secure.ekonsulat.gov.pl/Uslugi/RejestracjaTerminu.aspx?IDUSLUGI=1&IDPlacowki=157 [dostęp: 15 IV 2018].
  • O’Brien B., U.S. visa applicants to be asked for social media history: State Department, https://www.reuters.com/article/us-usa-immigration-visa/u-s-visa-applicants-to-beasked-for-social-media-history-state-department-idUSKBN1H611P [dostęp: 15 IV 2018].
  • Reid Meloy J., Identifying warning behaviors of the individual terrorist, http://drreidmeloy.com/wp-content/uploads/2016/05/2016_IndividualTerrorist.pdf [dostęp: 15 IV 2018].
  • Ross B. i in., Secret US Policy blocks agents from looping at social media of visa applicants,former official says, http://abcnews.go.com/US/secret-us-policy-blocksagents-social-media-visa/story?id=35749325 [dostęp: 15 IV 2018].
  • Schengen Information System, http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/borders-and-visas/schengen-information-system/index_en.htm [dostęp: 15 IV 2018].
  • Serrano R.A., FBI chief: San Bernardino shooters did not publicly promote jihad on social media, http://www.latimes.com/nation/la-ln-fbi-san-bernardino-socialmedia-20151216-story.html [dostęp: 15 IV 2018].
  • Shontell A., 7 People who were arrested because of something they wrote on Facebook, http://www.businessinsider.com/people-arrested-for-facebook-posts-2013-7?IR=T [dostęp: 15 IV 2018].
  • Social media use in law enforcement: crime prevention and investigative activities continua to driver usage, https://www.lexisnexis.com/risk/downloads/whitepaper/2014-social-media-use-in-law-enforcement.pdf [dostęp: 15 IV 2018].
  • Terrorist Screening Center, https://www.fbi.gov/about-us/nsb/tsc/tsc [dostęp: 15 IV 2018].
  • Twitter appeals ruling in bat tle over occupy Wall Street protester’s information, https://www.aclu.org/blog/twitter-appeals-ruling-battle-over-occupy-wall-street-protesters-information?redirect=blog/technology-and-liberty-national-security-free-speech/twitter-appeals-ruling-battle-over-occupy [dostęp: 15 IV 2018].
  • Twitter, Guidelines for law enforcement, https://support.twitter.com/articles/41949# [dostęp: 15 IV 2018].

Document Type

Publication order reference



YADDA identifier

JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.