A recent report on Hostile Social Manipulation stated that the tools and techniques being employed in targeted social media campaigns, sophisticated forgeries, cyberbullying and harassment of individuals, and distribution of rumors and conspiracy theories pose a “potentially significant threat to U.S. and allied national interests”. This creates a challenge for an Intelligence, Surveillance and Reconnaissance (ISR) force comprised of platforms, sensors, networks and personnel that have been focused on overseas contingency operations for nearly 20 years. Recent defense strategy emphatically stated, “Inter-state strategic competition, not terrorism, is now the primary concern in U.S. national security.” Joint guidance on Operations in the Information Environment (OIE) emphasized the need for a better characterization and assessment of the informational as well as physical, and human aspects of the security environment in order to identify and leverage interdependencies between them. Carley and Beskow wrote, “Social cybersecurity is an emerging subdomain of national security that will affect all levels of future warfare, both conventional and unconventional, with strategic consequences”4 and characterized a set of 16 socio-cyber security forms of maneuver in the BEND model. This paper will introduce the BEND model, providing real-world examples of maneuvers, and highlight emerging multi-source analytics for discernment of threat.