Social nets could hold wealth of info on Boston bombers

As manhunt is on for surviving suspect, their social nets could hold critical clues

Dzhokar Tsarnaev, one of the suspects in the marathon bombing, is still on the run. (Image: FBI) As the manhunt goes on for the surviving suspect in the Boston Marathon bombing, the bombers' social networks could give investigators needed clues about them.

The City of Boston, along with neighboring Watertown, Newton and Cambridge, are in lock down, with residents warned to stay inside their homes with their doors locked as Boston police and federal agents hunt for suspected bomber 19-year-old Dzhokhar A. Tsarnaev.

Tsarnaev has been on the run since he and his brother Tamerlan Tsarnaev, 26, allegedly killed an MIT police officer and carjacked an SUV late Thursday night. The older brother, Tamerlan, was killed during a shootout with police.

Both brothers are believed to be behind the two bombs that went off at the finish line of the Boston Marathon on Monday. The blasts killed three people and injured more than 170 others.

Now that the brothers have been identified, investigators are looking for information about the two men.

Their social networks could hold a wealth of information.

"These suspects were reasonably active on social media and it looks like investigators have been picking up these threads and using them to push the investigation forward," said Dan Olds, an analyst with The Gabriel Consulting Group. "All of the information on these sites goes toward building a picture of these guys and putting together the entire story."

While Tamerlan Tsarnaev had a YouTube channel, his younger brother Djohar appears to have maintained an account on , a social network popular in in Russia, the Ukraine, Kazakhstan and Israel.

On the site, Djohar listed Boston as his current city and posted that he is a 2011 graduate of Cambridge Rindge and Latin School, a public school in Cambridge, Mass.

Under his "world view," Tsarnaev lists "Islam" and adds that his personal priority is "career and money."

Most of the page, which today has been filled with mostly angry comments, is not written in English.

However, Keith Jones, an independent computer forensics examiner, said he's sure investigators have gone through the social networking page, looking not only for Tsarnaev's views and mind set, but also for his group affiliations, as well as his list of online friends.

"If I was a police officer, I would be looking at social media," Jones said. "As soon as these guys were suspects, their sites were worth a look at... As an investigative tool, it's great."

He added that social networks could help investigators figure out who knows who on the social network, the suspect's friends and possible places where he might be hiding. It also could give them ideas about who they interview to get more information on the suspects.

"In most cases, computer evidence isn't the smoking gun," Jones said. "What it is, though, is the complete picture behind the smoking gun."

Brooke Fisher Liu, an associate professor and researcher on social networks at the University of Maryland, said since there's a manhunt on for the younger Tsarnaev, his social network page may be particularly useful.

She explained that many young people are post on their favorite social networking site where they go on a daily basis. Investigators can look at this site and see where he's comfortable going and where he might have friends or groups that would take him in.

"If the information is out there, [law enforcement] is going to go look for it," Liu said. "

Olds also noted that Tsarnaev's page could give law enforcement a direction to search in.

"They'll look for relatives, friends, sympathizers, and even acquaintances, probably making contact with them and asking if they have any idea where this guy might be and who else might be involved," he added. "As the authorities track down their network, a fuller picture will emerge."

Dzhokar and Tamerlan Tsarnaev, the suspects in the Boston Marathon bombing, shown in this FBI image at the marathon on Monday. Tamerlan Tsarnaev died early Friday in a shootout with police.

Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, on Google+ or subscribe to Sharon's RSS feed. Her email address is

See more by Sharon Gaudin on

Read more about social media in Computerworld's Social Media Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags Internet-based applications and servicessecurityinternetfbisocial media

More about FBIGoogleMITTopic

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Sharon Gaudin

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place