Professional Documents
Culture Documents
I
n April 2017, the National Institute of Justice convened
an expert panel to assess, and identify high-priority needs
Ke y F i ndi ng s
for, law enforcement’s use of two closely linked tech-
nologies that have potential to provide key information
• Expert panelists characterized business cases for employing social
needed to address crime risks, hold offenders accountable,
media and social network analysis in law enforcement, including
and ensure physical safety: social media analysis and social
monitoring for short-term safety threats in postings; identifying
network analysis. Social media analysis consists of meth-
those at high risk of involvement in violence, either acutely or
ods and tools to collect and analyze text, photos, video,
chronically; and investigating specific crimes and organized crime
and other material shared via social media systems, such
networks.
as Facebook and Twitter. Social network analysis is a type
of data analysis that investigates social relationships and • The panel also specified a core case not to do: monitoring of First
structures as represented by networks (which can also be Amendment–protected activity for vague purposes.
called graphs). Social media, given that it reflects relation- • The panel specified a framework for providing computer security,
ships inherently, is a key source of data for social network privacy, and civil rights protections when employing social media
analysis; conversely, social network analysis is one key type and social network analysis.
of social media analysis.
• Finally, the panel identified and prioritized needs for innovation
In all, the panel discussed five core business cases for
related to social media and social network analysis. The four
employing social media analysis and social network analysis
themes of this innovation agenda are (1) supporting working with
in law enforcement:
communities to develop policies and strategies for using social
1. Social media analysis: Monitoring for activity media analysis and social network analysis; (2) technical develop-
indicating short-term safety threats in postings, and ment, starting with assessing current tools and how they might be
communicating responses as needed. better tailored to law enforcement; (3) law enforcement–specific
2. Social network analysis, possibly with social media training on these types of analysis; and (4) creation of a help desk
data: Identifying those at high risk for involvement in to help law enforcement agencies navigate requests to social
violence. media companies and interpret the resulting data.
3. Social media analysis: Actively monitoring the high-
risk to see whether violence may be imminent.
4. Social media analysis and social network analysis: Investigating organized crime networks.
5. Social media analysis and social network analysis: Investigating crimes.
The panel also discussed one core case not to do:
1. Monitoring First Amendment–protected activity for vague or unspecified purposes.
2
The panel identified a framework for providing computer disseminating best practices for transparency and collaborative
security and protecting privacy and civil rights. This framework decisionmaking for employing social media and social network
is shown in Figure S.1 and consists of the following types of analysis technologies, as well as collaboratively creating a series
protections: of model policies for employing and securing these types of
• Data protections ensure that legal backing is there for all analysis.
data collected for law enforcement purposes; that covert The second part of the agenda is technical research on law
and undercover operations using social media analysis enforcement–specific social media and social network analysis.
similarly have legal backing; and that the collected infor- The initial recommendation is to assess the capabilities of cur-
mation is protected from both external and insider threats. rent tools and methods and how they might be better tailored
• Analysis protections similarly ensure that legal backing to law enforcement, with the first step of that assessment being
is there for all law enforcement analyses, and that analysis to create and disseminate a market survey of what tools and
results are protected from external and insider threats. methods are found useful by practitioners now and how well
More broadly, these protections help ensure equitable they are working.
justice outcomes by protecting against inaccuracies and The third part of the agenda is supporting law
biases. enforcement–specific training on social media and social net-
• Action protections ensure that policing practices are not work analysis. Here, the initial recommendations are to develop
distorted and that both enforcement and social service requirements for training and assess gaps between current com-
actions are employed consistently and equitably. mercial- and defense-focused training and what is needed for
law enforcement training. This implicitly includes studies and
The core business cases and protection framework elements
analyses of what tools and methods are working best in support
are outlined in this report.
of law enforcement operations. Training on legal implications
Reflecting both the business cases and the protection
and protections is a short-term need that can be addressed by
framework, the expert panel identified a series of needs for
developing a model curriculum.
innovation to better support the use of social media and social
The final part of the panel’s innovation agenda is a help
network analysis in law enforcement. These needs fall across
desk to help law enforcement agencies navigate requests to
four themes that define an innovation agenda (Figure S.2) to
social media companies. The help desk would help agencies
support the appropriate and sustainable use of these tools for
with making process requests more likely to result in data
public safety purposes.
returns and/or content takedowns that address the needs of
The first part of our expert panel’s innovation agenda is
specific cases; it would also help agencies process and interpret
to support working with communities to develop policies and
the data returned from process requests.
strategies for using social media and social network analysis.
Here, the initial recommendations relate to developing and
Figure S.2. The Innovation Agenda
Figure S.1. An Initial Privacy, Security, and Civil
Rights Protection Framework 1. Enable working 2. Technical
with communities research for law
to develop policies enforcement-
and strategies for specific use of
using social media social media and
and social social network
Data
network analysis analysis
Community
relations
4. Help desk to
Analysis 3. Support law
assist agencies
enforcement-
with social media
specific training
companies
Actions
RAND RR2301-S.2
RAND RR2301-S.1
3
Tie
Node
Figure 3. Central Nodes and Network Subgroups with “central” roles in criminal networks; social network analysis
High degree centrality naturally provides methods for analyzing social media data for
Group 1
investigative purposes.
Group 2
Recent cases, law enforcement presentations, and published
accounts provide a range of examples of the use of social media
data and social network analysis for law enforcement purposes:
and social network analysis tools should answer; which ques- Needs-generating and needs-prioritizing process. After
tions social media data and social network analysis tools should the business case discussion, the panel turned to discussing and
not help answer; what specific security, privacy, and civil rights prioritizing needs. The process is summarized in Figure 4.
protections are needed; and specific problems or opportunities The first step is to identify “innovation opportunities”:
related to social media data and social network analysis that problems to address, or opportunities to take advantage of, to
should be discussed at the workshop. In addition to providing a better support law enforcement objectives and core business
way for panelists to contribute to shaping the discussion during cases. The panel began with the set of problems and opportuni-
the meeting, the questionnaire also helped to define a common ties from the questionnaire, and added to it during the work-
framework for identifying top issues and developing needs for shop. The second step was to propose one or more solutions for
innovation to address those issues. each problem or opportunity—a specific idea for an innovation,
Developing business cases for applications of social which can be technical but can also concern policy, practice,
media and social network analysis. A business case is a organization, or training. In our work, each need consists of
description of a potential project or task that provides enough a problem/opportunity statement and a solution statement.
clarity on what is to be done to support making resource alloca- There can be multiple solution statements—and hence multiple
tion decisions about it (e.g., Herman and Siegelaub, 2009). needs—for the same problem/opportunity, capturing different
Given the relative novelty of these types of analysis to law options or strategies that are available.
enforcement, this project included working with the panel to To make it possible to identify needs that were more
identify major applications of social media and social network important to pursue, in the third step, we asked the panel to
analysis for law enforcement and develop business cases for prioritize the needs that came out of the discussion. To do
them. Our descriptions include so, the panelists scored each need for two measures: potential
• describing what the applications are and what law importance if the need was successfully met, and likelihood
enforcement objectives they support that it could be successfully met (in general). Each measure was
• describing the core steps in the business process to carry rated on a scale of 1 to 9, with 1 being low and 9 being high,
out the applications, including providing process flow using an online questionnaire.
diagrams Using a similar methodology as prior Priority Criminal
• describing both known recommended and inadvisable Justice Needs Initiative studies, we then generated median
actions needed to carry out the applications successfully expected value scores and divided the needs into three tiers by
and avoid political and legal pitfalls.
The business cases can be thought of as a simplified and Figure 4. Identifying and Prioritizing Needs for
Innovation
generalized version of technical use cases. We do not use “use
case” terminology here, as use cases commonly involve detailed Problems to
solve
New useful
technologies
Step 1:
technical documentation, including Unified Modeling Lan- Identify innovation Opportunities
guage (UML) use case diagrams that were not an intended opportunities to improve
performance
product of our effort (for example, Adolph, Cockburn, and
Bramble, 2002).
Most of the panel’s discussion of business cases focused on Potentially multiple
Step 2:
ways to achieve the
Frame policy, technology
the operational questions that social media and social network or practice needs required
same goal or leverage
the same innovation
analysis tools should or should not help answer, as well as to take advantage of them opportunity
into major business cases for social media and social network
Tier 3
analysis.
RAND RR2301-4
7
Table 1. Business Cases for Social Media and Social Network Analysis
Relevant to Relevant to
Business Case Social Media Analysis? Social Network Analysis?
Monitoring for worrisome activity √
Identifying those at high risk for involvement in violence √
Actively monitoring high-risk situations √ √
Investigating organized crime networks √ √
Investigating specific crimes √ √
8
Figure 5. Monitoring Social Media for Worrisome Panelists also noted false positive issues in monitoring
Activity social media. Keyword searches have frequently returned irrel-
Flag posts in a evant posts, giving law enforcement staff too many postings to
given region Review wade through to identify real emergencies.
Prioritize Take
that match results
results actions An emerging trend within this business case is integrating
keywords of (manual)
concern social media into calls for service. Panelists discussed a future
in which social media text posts, images, and video could all
• Gun • Look for • Send officers to
• Knife a surge investigate be part of emergency “calls” that would get into public safety
• Suicide of posts • Communicate access points (PSAPs). Next Generation 911 is in part intended
with risks to public
• Protesta
• Etc.
keywords • (For events) to address this need (National Telecommunications and
• Etc. Communicate
with organizers Information Administration, 2017). Agencies would then have
on event the capability to retransmit information to officers who need it
management
over emerging LTE and wireless networks (this was discussed in
a
Problematic—mitigated if for safety/event management purposes.
RAND RR2301-5 detail at the National Institute of Justice’s workshop on future
broadband communications technologies; see Hollywood et al.,
stories here in rapidly detecting (nonlethal) bomb explosions
2016). However, there are many issues to address, starting
and suicide attempts. Similarly, panelists noted that monitoring
with how to verify incoming data and validate the informa-
a specific suspect’s posts as part of a criminal investigation was
tion’s time and location. Panelists described a case in which a
appropriate. Note that such monitoring is not technically part
reported image of a man pointing a gun at a toddler was ulti-
of this business case—it is covered in other business cases.
mately found to have come from overseas and was likely a hoax.
As for cases between the extremes above, the discussion
focused on how these needed to be worked out at the local
level, community by community. This led to panel discussions
Identifying Those at High Risk for
on the need for transparency and how to engage communities
Involvement in Violence
more effectively, with the Privacy Advisory Council of Oak-
This business case relates to identifying and intervening with
land, California, used as an example (City of Oakland, 2017).
persons who are at high risk of being involved in violence (and,
The group noted that some of the social media monitor-
potentially, other major crimes as well), whether as a perpetra-
ing applications that have attracted the most concern have
tor, victim, or both. Here, increased risk of being engaged in
had to do with law enforcement agencies monitoring First
or targeted for violence is determined through a combination
Amendment–protected speech for reasons appearing to fall
of social media postings and other law enforcement tips. Risk
outside of public safety or policing. Some panelists suggested
is also determined through relationships to others involved in
that these problematic applications may be from commercial
violence and other major crimes (as detected through co-arrest
technology providers attempting to adapt existing monitor-
records, field interview reports, social media connections, and
ing applications designed for commercial, advertising, or other
other relationship data), as well as additional quantitative data
non–public safety purposes to law enforcement to broaden the
about a person. Figure 6 shows the business process diagram for
market for existing (or modestly modified) tools. For example,
this case.
a commercial sales pitch along the lines of
Interpreting social media and other law enforcement data
Wouldn’t you like to know who uses your product, what is discussed in more detail in the next business case. This case
they think about it, and where they are? Now you can! focuses more on using social network analysis and analysis of
might be naïvely converted for a law enforcement audi- other quantitative data to identify those most at risk of involve-
ence, without regard to concerns about monitoring of First ment in violence. Here, social media data are seen primarily as
Amendment–protected speech: an input, used to identify and characterize social relationships.
Wouldn’t you like to know who the #TodaysProtest- As noted, high-risk individuals tend to be central in
Group’s supporters are, what they think, and where they the social networks of those involved in crime (e.g., Green,
are? Now you can! Horel, and Papachristos, 2017; Papachristos, Wildeman, and
Roberto, 2015). Here, being central typically relates to “degree
9
Figure 6. Identifying Persons at High Risk for Figure 7. Degree- and Betweenness-Central Persons
Involvement in Violence in Social Networks
Capture data on
Analysis: ID those Intervene with
personal
who are centrala those who are
relationships with
in the networks at high risk
crime victims,
of criminals and (e.g., focused
perpetrators, and
victims deterrence)
criminal groups
with proactive risk-reduction measures such as focused deter- ing communications, even before any concealment efforts by
rence, care must be taken to avoid punishing people for crimes individuals seeking to obscure the meaning of their postings are
they might commit in the future but have not actually commit- considered. One cannot just look for “threatening” keywords
ted. Similarly, analysts need to be able to differentiate between or images; panelists noted cases in which posting music lyrics
people who are high-risk because they are a high threat to the or pictures of guns for general deterrence purposes were falsely
community versus those who are at high risk of becoming a vic- considered to be threats. Panelists suggested that one strategy
tim (chronic substance users, chronic gamblers, low-level street could be involving local youths in efforts to “translate” postings
dealers, those who are related to high-threat persons, etc.), and and language to help identify genuine threats.
tailor interventions accordingly.
a result, action being driven solely by an individual having one assessing community councils for deciding on privacy contro-
“bad guy” among his or her 500 connections was not viewed as versies, and assessing what parts of legacy guidance are out-
appropriate. dated and how to replace them.
The second was to have policies to govern how to make The second part of this theme builds off improved relations
decisions about interventions consistently and in an unbiased with stakeholders to collectively develop model procedures and
manner. For interventions such as focused deterrence informed policies. Specific needs here include developing policies for using
by social media data or social network analysis, these include commercial social media tools, conducting covert social media
deciding what to do with those “at risk” consistently, account- research, and conducting undercover social media investiga-
ing for whether the person is a high threat to the community tions and more broadly pursuing consensus on the tools being
versus at high risk of being a victim. Consistent criteria to guide used, quality assurance, protections against bias, and civil liber-
the decision whether to “provide help” or “prosecute fully” ties protections (Table 3).
when individuals are identified as high risk would help mini-
mize the potential for these new data streams to reinforce or
even create new sources of bias in justice decisionmaking. Theme 2: Supporting Technical Research for
Law Enforcement’s Use of Social Media and
Social Network Analysis
In general, panelists noted that both use and understanding
N E E DS FO R I N N OVATI O N of these types of analysis for law enforcement were in their
Informed by the business cases and discussion of the types infancy. Thus, there is an overarching need for research and
of protections merited for these types of data and analytical development on law enforcement applications, including
approaches, the panel turned to the identification of needs research and evaluation on social media monitoring; social
related to social media and social network analysis application media and social network analysis tools and techniques as
in law enforcement. As a result of that discussion, the expert applied to law enforcement applications; and tools and tech-
panel collectively identified and prioritized 37 needs. The niques supporting search and interoperable data extraction
complete list of needs is presented in Appendix B. Twenty-two from a full range of social media postings (text, images, video,
of these needs met our criteria for being priority needs. These etc.). See Table 4.
22 could be logically grouped under four themes. (Appendix As shown in Figure 9, research and development are
A describes the full technical methods for generating needs, needed throughout the social media and social network analysis
prioritizing them, and grouping the priority needs into themes.) chain:
• Getting data. Panelists noted that it is very difficult to
extract data accurately and consistently. There are needs
Theme 1: Supporting Working with both to assess existing extraction features in social media
Communities to Develop Policies and tools and to develop new tools.
Strategies for Using Social Media and • Searching data for relevant information. Panelists
Social Network Analysis indicated that data sets (especially for social media) are
The panel’s first theme calls for a two-part agenda for multi- often enormous and impractical to review manually. There
stakeholder policies and strategies development. The first, is a need to develop a search capability tailored to law
improving how agencies work with community stakeholders on enforcement needs.
social media and social network analysis issues, directly informs • Data analysis tools. Panelists noted needs for technical
developing improved policies and strategies for employing these assessments of current social media analysis, social network
types of analysis. This theme includes developing best practices analysis, and redaction tools to better understand what
for discussing uses of social media data and social network could be better employed now and what remains to be
analysis with the public, as well as engaging with stakeholders developed. Panelists noted that these assessments can
on policy decisions and follow-up actions (Table 2). The theme start with only baseline descriptions of tools practitioners
also includes working with communities to assess specified currently view as useful for particular applications;
social media and social network analysis policies, including reflecting this need for knowledge sharing, there was strong
13
Table 2. Priority Needs to Improve Partnerships with Communities on Social Media and Social Network
Analysis Issues
Issue Need Comment
There is a lack of public review and discussion of law Develop best practices for transparency with Top of Tier 1
enforcement policies on social network analysis. regard to use of social network analysis and
accompanying data.
There is a lack of public review and discussion of law Develop best practices for transparency with
enforcement policies on social media. regard to use of social media data.
When analyses provide valuable insights into risk to
Conduct research on best practices with regard
members of the public, community groups, experts,
to actions taken by practitioners from multiple
technologists, and law enforcement should collaborate
disciplines when risks are identified.
from the beginning.
There are challenges in balancing transparency, privacy, Conduct a review of the efficacy and
and judicial fairness in handling digital evidence for acceptability of state and local privacy councils
criminal justice and public access purposes. (one example is in Oakland, California).
When analyses provide valuable insights into risk to
members of the public, community groups, experts, Identify the best times and places to engage the
technologists, and law enforcement should collaborate community, practitioners, and other experts.
from the beginning.
Best practices and policy guidelines have been published Conduct periodic reviews of existing policies
by a variety of organizations over the years in multiple and procedures, with the intention of codifying
versions, but there is no authoritative way of determining content and identifying potentially outdated
whether an older one has been superseded. guidance.
data to a U.S. law enforcement agency because some or all of • help interpret the results, which includes providing tools to
it is located outside the country). Panelists were also skeptical search or analyze data produced in formats that may also
of being able to negotiate these issues with companies on an change over time
agency-by-agency basis. For example, panelists noted that some • help submit requests for social media companies to
social media companies consistently chose not to participate in shut down live feeds and posts of violence and safety-
meetings with law enforcement groups, limiting opportunities threatening activity.
to build consensus and strengthen collaboration. See Table 6.
Instead, panelists requested funding a “help desk” that
would
• help agencies submit process requests that social media
companies will not reject, which includes monitoring shifts
in the companies’ requirements over time and helping
agencies submit requests that are sufficiently limited and
germane to investigations at hand
Table 6. Priority Needs for a Help Desk for Interacting with Social Media Companies
Issue Need Comment
Often, “real-time” crimes are streamed live on social Explore establishing (and supporting) peer “help
media. In such situations, law enforcement needs to be desk” experts for practitioners to reach out to in
able to quickly inform the site to take down the video. such situations.
The “data” returned from legal process requests are often Establish a help desk–type system whereby
unusable or difficult to correlate with existing data. investigators can be connected with other
investigators who are experts in obtaining and
extracting information from particular sources.
The “data” returned from legal process requests are often Establish or fund a liaison that can be a High-value, high-risk
unusable or difficult to correlate with existing data. source of knowledge on how to obtain usable
information from specific sources (mobile phone
companies, social media companies, etc.).
16
Figure A.1. Plots of Needs’ Median Expected Values, • Need in Tier 2 but had same or greater median ratings for
by Tiers individual measures as other Tier 1 needs. This set includes
70 one need that had an identical solution statement to
another Tier 1 need—just a different motivating problem
60
statement.
Median expected value
Figure A.2. Dendrogram of Social Media/Social Analysis Needs (from Hierarchical Clustering)
200
150
Height
100
50 Tier 1
Tier 3 Tier 2
0
3 4 1 2 5 6 7 8 9 10 11 15 14 12 13 34 32 33 30 31 37 35 36 26 24 25 29 27 28 23 21 22 19 20 16 17 18
Figure A.3. Plot of the 37 Needs by Median Likelihood of Success and Median Operational Value
9
Non-priority needs Priority needs
(15 total) (22 total)
8
Operational value
6
Tier 1
4
Tier 2
Tier 3
3
High value
High Tier 2
2
Priority line
1
1 2 3 4 5 6 7 8 9
Likelihood of success
RAND RR2301-A.3
BP for public
discourse of SNA 0 0 0 0 0 0 0 1 1 0
uses
SOP for
undercover SM 1 0 0 0 0 0 1 0 0 0
investigations
Training on legal
0 0 0 0 0 0 0 0 0 0
issues
Tech assessment of
SM monitoring 0 0 0 0 0 0 0 0 0 0
tools
Help desk for
0 0 0 0 0 0 0 0 0 0
taking down feeds
SOP for covert SM
1 0 1 0 0 0 0 0 0 0
research
BP for public
discourse of SM 0 1 0 0 0 0 0 0 1 0
uses
BP for
multi-stakeholder 0 1 0 0 0 0 0 1 0 1
responses to risks
Policy assessment 0 0 0 0 0 0 0 0 1 0
of privacy councils
BP for how to
engage 0 1 0 0 0 0 0 1 1 1
stakeholders
Tech assessment of
0 0 0 0 1 0 0 0 0 0
redaction tools
Policy assessment
to ID outdated 0 0 0 0 0 0 0 0 0 1
guidance
ID extent of
training gap for LE 0 0 0 1 0 0 0 0 0 0
on SM/SNA
…
RAND RR2301-A.4
20
1. Enable working with communities to develop policies and strategies for using social media and social network analysis
Policy assessment to identify
outdated guidance Standard operating procedures for undercover
social media investigations
Policy assessment of privacy councils
Standard operating procedures for paid social media tools
Initiative for consensus on tools, QA, and protections
Standard operating procedures for covert social media research
Best practices for how to engage stakeholders
Table B.5. Priority Needs for a Help Desk for Interacting with Social Media Companies
Issue Need Comment
Often, “real-time” crimes are streamed live on social Explore establishing (and supporting) peer “help
media. In such situations, law enforcement needs to be desk” experts for practitioners to reach out to in
able to quickly inform the site to take down the video. such situations.
The “data” returned from legal process requests are often Establish a help desk–type system whereby
unusable or difficult to correlate with existing data. investigators can be connected with other
investigators who are experts in obtaining and
extracting information from particular sources.
The “data” returned from legal process requests are often Establish or fund a liaison that can be a High-value, high-risk
unusable or difficult to correlate with existing data. source of knowledge on how to obtain usable
information from specific sources (e.g., mobile
phone companies, social media companies).
23
Table B.6. Other Needs from the Social Media/Social Network Analysis Workshop
Issue Need Comment
There are not enough social network analysis Conduct research into the gaps between where Tier 2
practitioners to meet the demand. the profession is now and where it should be.
Often there are several needs to redact video evidence Tier 2
Develop a standard policy for what and how to
(e.g., discovery, evidence/exhibits, and public/freedom
redact.
of information).
When social network analysis is successful at identifying Develop best practices for sharing information Tier 2
individuals at risk, law enforcement often has difficulty with individuals and multidisciplinary
finding an appropriate way to share those insights. organizations (e.g., social support
organizations)
When relocation information is obtained, the algorithm Tier 2
Conduct research and interviews with industry
that was used (GPS, Wi-Fi/cell triangulation) and the
organizations to identify ways to address this
level of accuracy is often unknown (and cannot be
issue.
obtained from the company because it is proprietary).
The “data” returned from legal process requests are often Establish (and require compliance with) a Tier 2
unusable or difficult to correlate with existing data. standard for structuring certain types of
information in response to legal process
requests (this has more or less occurred with
cellular carrier data).
It is difficult to determine the most appropriate broadness
or narrowness of scope for an electronic records request Conduct research on best practices and publish
Tier 2
(e.g., requesting Google’s records for a unique search with appropriate case story vignettes.
two weeks before an event within a town of 25,000).
When evidence or data are delivered, there isn’t a
Develop a set of metadata descriptions for
readily available index or table of contents to point
typical evidence types that are obtained from Tier 2
investigators/prosecution to the most important and
devices and organizations.
relevant items.
There are challenges in balancing transparency, privacy, Conduct a review of state and local freedom
and judicial fairness in handling digital evidence for of information laws and policies to determine
Tier 3
criminal justice and public access purposes. appropriateness for redaction of new
technologies such as body-worn camera video.
The “data” returned from legal process requests are often Establish a database that can be a source of
unusable or difficult to correlate with existing data. knowledge on how to obtain usable information
Tier 3
from specific sources (mobile phone companies,
social media companies, etc.).
Social network analysis algorithms don’t support cross- Develop or identify tools that can compare
checking. patterns identified in internal law enforcement
Tier 3
data with patterns identified in social media
data.
Crimes are often “reported” by sharing text, photos, or Develop or identify tools (software or services)
video on social media or directly with law enforcement. that can identify geographic features in images
In such situations, geolocation or entity resolution (who is and correlate them with known locations, Tier 3
in the picture, etc.) is difficult. individuals, etc. (TrafficCam.com and Griffeye
have some of this functionality.)
Social network analysis tools and geographic information Conduct research on best practices for
system tools often do not interoperate very well. conducting analyses using both types of
Tier 3
analysis (and potentially identify gaps in
functionality).
24
Table B.6—continued
Issue Need Comment
Accurately extracting meaning from social media Conduct research to identify the appropriate
communications is difficult because language and style is amount of knowledgeable interpretation and Tier 3
dynamic and constantly changing. validation when making “automated” decisions.
Lack of social media companies being involved may
lead to increased efforts to block investigative tools— Conduct or facilitate an “industry exchange”
e.g., concerns about internet service providers and where the companies and state and local Tier 3
email service providers taking actions to evade search agencies can better understand each other.
warrants.
In emergencies where a life is threatened, social
media companies should be compelled to provide the
information requested by law enforcement (e.g., the Conduct research and interviews to examine the
“2703” exemption language should be changed from feasibility and acceptability of modifications to Tier 3
“may” to “shall”). If the emergency request is not in good the law.
faith, there should be appropriate sanctions against the
officer or the officer’s agency.
25
Jackson, Brian A., Joe Russo, John S. Hollywood, Dulani Woods, Paulo, Damon, Bradley Fischl, Tanya Markow, Michael Martin,
Richard Silberglitt, George B. Drake, John S. Shaffer, Mikhail and Paulo Shakarian, “Social Network Intelligence Analysis to
Zaydman, and Brian G. Chow, Fostering Innovation in Community Combat Street Gang Violence,” Proceedings of the 2013 IEEE/ACM
and Institutional Corrections: Identifying High-Priority Technology International Conference on Advances in Social Networks Analysis and
and Other Needs for the U.S. Corrections Sector, Santa Monica, Calif.: Mining (ASONAM ’13), 2013, pp. 1042–1049. As of April 9, 2018:
RAND Corporation, RR-820-NIJ, 2015. As of July 2, 2018: https://arxiv.org/pdf/1306.6834.pdf
https://www.rand.org/pubs/research_reports/RR820.html
Pew Research Center, “How We Analyzed Twitter Social Media
Johnson, Jennifer A., John David Reitzel, Bryan F. Norwood, Networks with NodeXL,” 2014. As of June 10, 2017:
David M. McCoy, D. Brian Cummings, and Renee R. Tate, “Social http://www.pewinternet.org/files/2014/02/How-we-analyzed-Twitter-
Network Analysis: A Systematic Approach for Investigating,” FBI social-media-networks.pdf
Law Enforcement Bulletin, March 5, 2013. As of June 12, 2017:
Popper, Ben, “How the NYPD Is Using Social Media to Put Harlem
https://leb.fbi.gov/articles/featured-articles/social-network-analysis-a-
Teens Behind Bars: The Untold Story of Jelani Henry, Who Says
systematic-approach-for-investigating
Facebook Likes Landed Him in Rikers,” The Verge, December 10,
LexisNexis Risk Solutions, Social Media Use in Law Enforcement: 2014. As of July 10, 2017:
Crime Prevention and Investigative Activities Continue to Drive Usage, https://www.theverge.com/2014/12/10/7341077/nypd-harlem-crews-
2014. As of June 11, 2018: social-media-rikers-prison
https://www.lexisnexis.com/risk/downloads/whitepaper/2014-social-
Scott, John, Social Network Analysis, Thousand Oaks, Calif.: Sage,
media-use-in-law-enforcement.pdf
2012.
Murtagh, F., Multidimensional Clustering Algorithms, Compstat
Social Media Research Foundation, “NodeXL Feature Overview,”
Lectures, Vienna: Physika Verlag, 1985.
Smrfoundation.org, 2016. As of June 10, 2017:
National Network for Safe Communities, Group Violence http://www.smrfoundation.org/nodexl/features/
Intervention: An Implementation Guide, Washington, D.C.: Office of
Ward, J. H., Jr., “Hierarchical Grouping to Optimize an Objective
Community Policing Services, 2016. As of April 10, 2018:
Function,” Journal of the American Statistical Association, Vol. 58,
https://nnscommunities.org/uploads/GVI_Guide_2016.pdf
No. 301, 1963, pp. 236–244.
National Telecommunications and Information Administration,
Wessa, P., Free Statistics Software, Office for Research Development
“Next Generation 911,” NTIA.doc.gov, January 2017. As of July 10,
and Education, version 1.2.1, 2018. As of June 26, 2018:
2017:
https://www.wessa.net/
https://www.ntia.doc.gov/category/next-generation-911
Acknowledgments
The authors would like to acknowledge the participation and assistance of the panelists of the 2017 Social Media and Social Network Analy-
sis Workshop. We would also like to acknowledge the contributions of Stephen Schuetz, Christopher Rigano, and William Ford of the National
Institute of Justice (NIJ), as well as the peer reviewers of the report: Luke Matthews of the RAND Corporation, Aili Malm of the California State
University at Long Beach, and anonymous reviewers selected by NIJ.
This publication was made possible by Award Number 2013-MU-CX-K003, awarded by the National Institute
of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or
recommendations expressed in this publication are those of the author(s) and do not necessarily reflect those of
the Department of Justice.
www.rand.org
The RAND Corporation is a research organization that develops solutions to public policy challenges to help
make communities throughout the world safer and more secure, healthier and more prosperous. RAND is
nonprofit, nonpartisan, and committed to the public interest.
RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a
C O R P O R AT I O N registered trademark.
RR-2301-NIJ