Threat Assessment Wayne Forgesson Threat Assessment Wayne Forgesson

The Missing Link in Threat Detection: From Identification to Action

Security intelligence professionals are confronted daily with concerning material: threats, hostile rhetoric, violent ideation. These signals emerge from numerous sources, across a wide variety of platforms including social media, forums, messaging apps, obscure websites.

An OSINT platform is indispensable for detecting threats and identifying persons of interest. But once a threat is identified, does your team know what to do next?

Behavioral Threat Assessment

Security intelligence professionals are confronted daily with concerning material: threats, hostile rhetoric, violent ideation. These signals emerge from numerous sources, across a wide variety of platforms including social media, forums, messaging apps, obscure websites.

An OSINT platform is indispensable for detecting threats and identifying persons of interest. It gathers digital breadcrumbs, indicators of violent intent, and reveals patterns that might otherwise remain hidden. But the crucial question remains: once a threat is identified, does your team know what to do next?

The Complexity of Modern Threat Analysis

Security teams must triage a range of potential threats. In this environment, a critical skill is differentiating between noise and genuine risk. A person ranting online about government corruption might be venting frustration. Another individual, using eerily specific language about a planned act of violence, could pose a real danger. The distinction between the two is subtle but vital.

A well-crafted behavioral threat assessment methodology helps analysts make this distinction with confidence. It provides a structured approach to evaluating risk, identifying warning behaviors, and recognizing escalating patterns that indicate a subject may escalate from rhetoric to violent action.

Threat vs. Pose: A Crucial Distinction

One of the most common mistakes in security assessments is focusing too much on whether someone has made a threat, rather than whether they pose a threat. Decades of research show that many attackers do not explicitly announce their intentions before they act. Instead, they exhibit behaviors - subtle but identifiable markers - that indicate a growing risk of violence.

A behavioral threat assessment isn’t about waiting for an individual to cross a red line. It’s about recognizing the patterns leading up to that moment.

Concerning behaviors might include fixation on a particular individual or organization, obsessive grievances, increasingly aggressive rhetoric, or even logistical steps toward an attack, such as acquiring weapons or conducting surveillance on a target.

The Critical Importance of OSINT

Open-source intelligence is an essential component of modern security operations, but it is not a standalone solution. Identifying a concerning online presence is only the beginning. Effective risk mitigation requires a structured evaluation process that considers multiple dimensions:

  • Intent: Is the individual merely expressing frustration, or do they exhibit signs of genuine commitment to violence?

  • Capability: Does the person have access to weapons, training, or the logistical means to follow through?

  • Opportunity: How close is the subject to their potential target, both physically and logistically?

  • Behavioral Trajectory: Are they demonstrating escalating patterns of hostility, planning, or preparation?

A sophisticated threat assessment process combines OSINT findings with behavioral analysis to create a comprehensive risk profile.

Recognizing the Warning Behaviors

Certain behaviors serve as indicators that an individual may be escalating toward violence. These warning signs don’t operate in isolation, but collectively contribute to an overall threat profile. Some of the most significant include:

  • Pathway behavior: Steps toward violence, such as researching past attacks, acquiring weapons, or making logistical preparations.

  • Fixation: An obsessive preoccupation with a person, ideology, or grievance, especially when it leads to an increasingly hostile tone.

  • Last-resort language: Statements indicating urgency or a belief that violence is the only remaining option.

  • Identity and justification: Viewing oneself as a warrior for a cause, adopting an ‘us vs. them’ mentality, or attempting to rationalize violence as necessary or righteous.

From Identification to Intervention

Recognizing these behaviors is just the first step. The real challenge is deciding what comes next. Does the subject require persistent monitoring? Should law enforcement be alerted? Is immediate intervention necessary?

Signal’s Behavioral Threat Assessment Guide provides a structured methodology to navigate these decisions. Drawing from both operational experience and academic research, the guide presents a framework for assessing threats and determining appropriate responses.

Instead of reacting impulsively to every inflammatory statement online, security teams can apply a methodical approach to distinguish between bluster and bona fide threats. This is the missing piece in many security strategies—the bridge between detection and decisive action.

Elevating Security Intelligence

The landscape of threat analysis is evolving. As the volume and complexity of digital threats increase, so must the methodologies used to assess and respond to them. OSINT platforms like Signal provide the necessary tools to surface threats, but structured behavioral assessments are what turn information into actionable intelligence.

Does your team have the expertise to make the right call? Can they confidently distinguish between a hostile but harmless individual and someone with the intent and capability to act? If not, they risk either overreacting to low-level threats or, more dangerously, overlooking real risks until it’s too late.

With the right methodology, security professionals can move beyond mere detection. They can anticipate, assess, and intervene—turning intelligence into prevention.

Want to learn more? Check out our Signal Behavioral Threat Assessment Guide.

Read More
Social Media Monitoring Ben Luxon Social Media Monitoring Ben Luxon

Why you Need to Upgrade your Social Media Security

We take a look at why and how attackers target social accounts as well as reviewing some of the current best practices for mitigating the risks.

For organizations, social media is vital for the success of their business. It forms a central part of their efforts to build brand awareness, establish their community, do market research and gather intelligence. However, because of the frequency with which it’s used and the importance of the role it plays, social media cybersecurity threats can have a very tangible impact on an organization through reputational damage, data breaches, or worse.

In a recent survey by Statista, it was revealed that 22% of internet users said that their online accounts have been hacked at least once, while 14% reported they were hacked more than once. Due to the constantly changing nature of technology and trends, it’s difficult to pin down a defined set of best practices. 

In this article, we take a look at why and how attackers target social accounts as well as reviewing some of the current best practices for mitigating the risks.

social media security

Why Do Hackers Target Social Media Accounts?

A successful account takeover can enable threat actors to achieve a variety of malicious objectives, from the distribution of malware to the spreading of misinformation. Some of the most common uses for a compromised account are as follows:

Continuing the Attack: Generally speaking, most people are wary of random messages from strangers. However, if you can gain access to someone’s account and launch your phishing campaign against their contacts you can leverage the trust already established as a personal contact to dramatically improve the success rate of the phishing campaign. In the case of an organization’s account, these attacks are particularly harmful as they can target thousands or even millions of followers and can come with serious associated reputational damage.

Gathering Intelligence: The actual account takeover might not be the endgame of the attack. Instead by taking over an account, they gain access to intelligence, from an individual's messaging history to extensive personal details on an individual and their contacts.

Reputational Damage: We’ve already mentioned the potential for reputation damage as a by-product. However, there is a chance that reputation damage is the entire objective of the attack. Attackers might have a grudge against an organization or person, for example. Once they have access to the account they could do a range of things, such as posting racist slurs from the account or directly targeting followers through the account.

Credential Stuffing: Many people use the same login credentials across websites. Once attackers have successfully compromised an account, they then attempt logins at other popular websites using the same credentials to see what else they can gain access to. Often the objective is a financial reward.

Blackmail: If embarrassing or damaging information is surfaced through the account attack then hackers are unlikely to miss the opportunity to blackmail the individual or organization to further their other objectives.

4 Examples of Successful Social Media Attacks

LinkedIn Hacked, Exposing 117 Million Credentials

  • When: May 2016

  • Tactic: Data Breach, Account Takeover

  • The 2016 LinkedIn data breach exposed 117 million records of its users including email and password combinations. These were sold on the dark web and allowed hackers to gain access to and control thousands of accounts as well as use the data for credential stuffing.

Vevo Hacked Via LinkedIn Phishing

  • When: September 2017

  • Tactic: Targeted Phishing & Malware

  • In 2017 the streaming service Vevo suffered a breach when one of its employees was phished via LinkedIn. Through this attack, hackers obtained and publicly released over 3TB worth of the company’s sensitive internal data.

HAMMERTOSS Malware

  • When: July 2015

  • Tactic: Malware/Data Exfiltration

  • HAMMERTOSS is a malware which was created to automatically search and extract data from social networks and was controlled by commands posted by attacker profiles. This novel approach to weaponizing social media shows the need to analyze social media as part of the full lifecycle of a cyber attack. 

Twitter Bitcoin Scam

  • When: July 2020

  • Tactic: Account Takeover

  • Through a series of targeted phishing campaigns, hackers were able to get access to internal systems and tools at Twitter. They used this access to take control of numerous high profile accounts, including verified accounts such as Kanye West, Barack Obama, Apple, and Joe Biden. The attackers used the platform to Tweet a message requesting Bitcoin be sent to a specific wallet number with a promise they’d return it doubled. In the short time the message was up the attackers collected over $100,000.

likes social media.jpg

6 Quick Tips to Improve your Organizations Social Media Cybersecurity

1. Employ strong unique passwords.

Avoid the risks of credential stuffing by ensuring that all accounts are locked with strong unique passwords.

2. Keep personal and business accounts separate.

Linking personal and business accounts just make it easier for hackers to gain access to both. So, when possible, keep a separate and distinct login and password for both. 

3. Restrict access and permissions.

Not everyone needs to have the ability to login to the organization’s social media accounts. Not everyone needs to be able to post, share or send messages through it. Additionally, when an employee leaves make sure to revoke their access to all social media accounts.

4. Be mindful about what you share.

Even harmless posts might unwittingly share sensitive data that could be used by attackers. For example, you might share an employee update, maybe congratulating an employee for having a child, information which could be used in a targeted spear-phishing campaign.

5. Protect the physical access points.

Make sure devices are password-protected, don’t leave USB devices lying around, ensure that wi-fi networks are private and secure. These physical security threats are particularly prevalent currently with many employees working from home

6. Be wary of third-party apps.

Third-party apps like scheduling softwares are invaluable, allowing you to save a huge amount of time. However, they also provide an additional way for attackers to gain access to your social media accounts. 

The Role of OSINT in Securing Social Media Platforms

live streams laptop on desk.png

By monitoring social networks for mentions of your brand and keywords, you’ll know right away when suspicious conversations about your brand emerge. For example, people might be sharing fake coupons or offers, or an imposter account starts tweeting in your name. Using OSINT you can monitor all the relevant activity online regarding your business and quickly identify fraud allowing you to respond to it in a timely fashion.

Additionally, you can use OSINT tools like Signal to monitor not only your social media channels for things like imposters but also for physical threats against employees or branch locations. 

OSINT is vital in identifying when one of the above-mentioned risks of social media becomes more than just a threat when it becomes a reality. Being amongst the first to know when something like this happens allows you to respond quickly and effectively.

Read More