top of page

Social Media Threat Assessment: A Guide for Security Professionals

As a security professional, you must have the knowledge and skills to assess whether a post is an actionable social media threat. What follows is a detailed step-by-step process to help you and your security team through this crucial task.


Establish context: Before diving into the analysis, it is essential to understand the context of the social media post in question. Gather information about the platform on which it was posted, the user's profile, followers, and any relevant affiliations. Consider the current socio-political climate and whether recent events or incidents might be related to the post's content.


Analyze the content: Carefully read and analyze the content of the post. Pay close attention to the language, tone, and choice of words. Look for direct or indirect threats, explicit or implicit suggestions of violence, or other indicators that the post may promote or encourage harmful actions.


Identify the target: Determine the intended target of the post. The target could be an individual, a group of people, a specific organization, or a particular location. The post may explicitly state or infer the target from the context.


Assess credibility: Evaluate the credibility of the user and the post. This process involves examining the user's profile, posting history, and any available background information. Determine if the user has a history of making threats or promoting violence or if they have any affiliations with extremist groups. Also, assess whether the post appears as part of a larger pattern or an isolated incident.


Evaluate capability: Consider the user's capability to carry out the threat. Capability factors might include access to weapons or other means of inflicting harm, technical skills or knowledge required to execute the threat or any known connections to others who might assist in carrying out the threat.


Determine imminence: Evaluate the urgency and time frame of the threat. Look for any indicators in the post that suggests when the threat might be carried out, such as specific dates, times, or events. Determine if the post calls for immediate action or is more of a long-term plan.


Cross-reference with other sources: Cross-check the information in the post with other sources, such as news reports, online forums, or other social media platforms. Determine if there is any corroborating evidence to support the threat or if the user has made similar threats on other platforms. Correlation can help establish the credibility of the threat and the user.


Consult subject matter experts (SMEs): When necessary, consult with relevant SMEs to gain additional insight into the potential threat. Consultation might include counter-terrorism specialists, behavioral analysts, or experts in the field or industry targeted in the post. Their expertise can provide valuable context and help you make a more informed assessment.


Document findings: Keep a detailed record of your findings throughout the analysis process. Your documentation should include a post summary, relevant screenshots or links, information about the user, and any supporting evidence you have collected. Also, document your thought process, any SME input, and your final assessment of the threat's credibility, capability, and imminence.


Determine the situation: Based on your analysis, determine whether the post constitutes an actionable social media threat. Consider the following factors:


  1. Credibility: Is the threat plausible, and does the user have a history of making similar threats?

  2. Capability: Does the user have the means and resources to carry out the threat?

  3. Imminence: Is the threat likely to be carried out soon, or is it more of a long-term concern?

Report and escalate: If you determine the post to be an actionable threat, report your findings to the appropriate personnel within your organization. Your socialization may include your supervisor, other analysts, or relevant law enforcement agencies. Provide a clear and concise summary of the threat, the context, and your assessment of its credibility, capability, and imminence. Ensure you include any supporting evidence and documentation you gathered during your analysis.


Develop a response plan: Work with your team and other relevant stakeholders to develop a response plan to address the threat. Your incident response plan should include contacting and informing potential targets, coordinating with other law enforcement agencies, or initiating surveillance or protective measures. Your response plan should be tailored to the threat and consider the information gathered during your analysis.


Monitor the situation: Continuously monitor the situation, the user, and any developments related to the threat. Maintain awareness of new information, changes in the threat landscape, or other posts that may provide further insight into the user's intentions or capabilities. Adjust your response plan as needed based on new information or changing circumstances.


Communicate with stakeholders: Maintain open lines of communication with all relevant stakeholders, including your team, other law enforcement agencies, and any affected individuals or organizations. Share updates on the situation, new findings, and changes to your response plan. Collaboration and information sharing is crucial to effectively addressing and mitigating the threat.


Debrief and evaluate: Conduct a debriefing session with your team and other involved parties after the threat has been resolved or mitigated. Discuss the steps taken during the assessment and response process, identify areas for improvement, and highlight best practices that should apply to future threat assessments. Continuous learning and refining your processes are essential to improving your ability to assess and respond to social media threats effectively.


Assessing whether a social media post is an actionable threat requires a thorough, methodical approach that involves understanding the context, analyzing the content, evaluating the credibility and capability of the user, and determining the imminence of the threat. Collaboration with relevant stakeholders, continuous monitoring, and effective communication are crucial components of this process. Following these steps consistently will help you and your team develop effective techniques, tactics, and procedures to identify and respond to social media threats.

Post: Blog2_Post
bottom of page