Abstract
Social media provides a fertile ground for any user to find or share information about various events with others. At the same time, social media is not always used for benign purposes. With the availability of inexpensive and ubiquitous mass communication tools, disseminating false information and propaganda is both convenient and effective. In this research, we studied Online Deviant Groups (ODGs) that conduct cyber propaganda campaigns in order to achieve strategic and political goals, influence mass thinking, and steer behaviors or perspectives about an event. We provide case studies in which various disinformation and propaganda swamped social media during two NATO exercises in 2015. We demonstrate ODGs’ capability to spread anti-NATO propaganda using a highly sophisticated and well-coordinated social media campaign. In particular, blogs were used as virtual spaces where narratives are framed. And, to generate discourse, web traffic was driven to these virtual spaces via other social media platforms such as Twitter, Facebook, and VKontakte. By further examining the information flows within the social media networks, we identify sources of mis/disinformation and their reach, i.e., how far and how quickly the mis/disinformation could travel and consequently detect manipulation. The chapter presents an in-depth examination of the information networks using social network analysis (SNA) and social cyber forensics (SCF) based methodologies to identify prominent information brokers, leading coordinators, and information competitors who seek to further their own agenda. Through SCF tools, e.g., Maltego, we extract metadata associated with disinformation-riddled websites. The extracted metadata helps in uncovering the implicit relations among various ODGs. We further collected the social network of various ODGs (i.e., their friends and followers) and their communication network (i.e., network depicting the flow of information such as tweets, retweets, mentions, and hyperlinks). SNA helped us identify influential users and powerful groups responsible for coordinating the various disinformation campaigns. One of the key research findings is the vitality of the link between blogs and other social media platforms to examine disinformation campaigns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A person who disseminates provocative posts on social media for the troll's amusement or because (s)he was paid to do so.
References
Professor describes Atari’s impact on gaming world. Technique, http://nique.net/life/2009/02/20/professor-describes-ataris-impact-on-gaming-world/. Accessed 1 May 2018
M. Zuckerberg, Biography.com, https://www.biography.com/people/mark-zuckerberg-507402. Accessed 3 May 2018
C. Gallo, Jeff Bezos banned powerpoint in meetings. His replacement is brilliant. Inc.com (2018), https://www.inc.com/carmine-gallo/jeff-bezos-bans-powerpoint-in-meetings-his-replacement-is-brilliant.html. Accessed 28 Apr 2018
D. Volkov, Supporting a war that isn’t: Russian public opinion and the Ukraine conflict. Carnegie Moscow Center (2015), https://carnegie.ru/commentary/61236. Accessed 9 Jan 2019
D.V. Gioe, Cyber operations and useful fools: the approach of Russian hybrid intelligence. Intell. Natl. Secur. 33, 954–973 (2018). https://doi.org/10.1080/02684527.2018.1479345
S. Tatham, Strategic Communication: A Primer (Defence Academy of the United Kingdom, Conflict Studies Research Centre, Camberley, 2008)
S.P. Borgatti, Centrality and network flow. Soc. Networks 27, 55–71 (2005). https://doi.org/10.1016/j.socnet.2004.11.008
M.K. Sparrow, The application of network analysis to criminal intelligence: an assessment of the prospects. Soc. Networks 13, 251–274 (1991). https://doi.org/10.1016/0378-8733(91)90008-h
R.B. Cialdini, Influence: Psychology of Persuasion (Collins Business, New York, 1993)
Senior Research Psychologist – Connections, amazon.jobs, https://www.amazon.jobs/en/jobs/655074/senior-research-psychologist-connections. Accessed 20 May 2018
R.A. Rodríguez-Gómez, G. Maciá-Fernández, P. García-Teodoro, Survey and taxonomy of botnet research through life-cycle. ACM Comput. Surv. 45, 1–33 (2013). https://doi.org/10.1145/2501654.2501659
M.S. Ackerman, J. Muramatsu, D.W. Mcdonald, Social regulation in an online game, in Proceedings of the 16th ACM International Conference on Supporting Group Work - GROUP 10 (2010). https://doi.org/10.1145/1880071.1880101
S. Hegelich, D. Janetzko, Are social bots on Twitter political actors? Empirical evidence from a Ukrainian social botnet, in Proceedings of the Tenth International AAAI Conference on Web and Social Media (International AAAI Conference on Web and Social Media (ICWSM-16) (2016)
A. Karasaridis, B. Rexroad, D. Hoeflin, Wide-scale botnet detection and characterization, in Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets (HotBots’07) (USENIX Association, Berkeley, CA, 2007), p. 7-7
N. Abokhodair et al., Dissecting a social botnet: growth, content and influence in Twitter, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW ’15, ed. by D. Cosley et al. (ACM, New York, 2015), pp. 839–851
S. Al-khateeb, N. Agarwal, Examining botnet behaviors for propaganda dissemination: a case study of ISIL’s beheading videos-based propaganda, in Proceedings of the Behavior Analysis, Modeling, and Steering (BEAMS 2015) co-located with the IEEE International Conference on Data Mining (ICDM 2015) (2015)
Z. Chu et al., Who is tweeting on Twitter: human, bot, or cyborg? in Conference, 2010 Annual Computer Security Applications Conference (ACSAC 2010), Austin, TX, USA - December 06 - 10, 2010 (ACM, New York, 2010), pp. 21–30
G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, B.Y. Zhao, Social turing tests: crowdsourcing sybil detection, in The Network and Distributed System Security Symposium (NDSS) (The Internet Society, 2013)
E. Ferrara, O. Varol, C. Davis, et al., The rise of social bots. Commun. ACM 59, 96–104 (2016). https://doi.org/10.1145/2818717
V. Subrahmanian, A. Azaria, S. Durst, et al., The DARPA Twitter bot challenge. Computer 49, 38–46 (2016). https://doi.org/10.1109/mc.2016.183
N. Alherbawi, Z. Shukur, R. Sulaiman, Systematic literature review on data carving in digital forensic. Procedia Technol. 11, 86–92 (2013). https://doi.org/10.1016/j.protcy.2013.12.165
K. Oyeusi, Computer Forensics (London Metropolitan University, London, 2009)
M. Mulazzani, M. Huber, E. Weippl, Social network forensics: tapping the data pool of social networks, in Eighth Annual IFIP WG, vol. 11 (2012)
N.A. Mutawa, I. Baggili, A. Marrington, Forensic analysis of social networking applications on mobile devices. Digit. Investig. 9, S24 (2012). https://doi.org/10.1016/j.diin.2012.05.007
N.A. Mutawa, I.A. Awadhi, I.M. Baggili, A. Marrington, Forensic artifacts of Facebook’s instant messaging service, in 2011 International Conference for Internet Technology and Secured Transactions (2011), pp. 771–776
K.M. Carley, J. Reminga, ORA: organization risk analyzer. Technical Report, Carnegie Mellon University, School of Computer Science, Institute for Software Research International (2004), http://www.casos.cs.cmu.edu/publications/papers/carley_2004_oraorganizationrisk.pdf. Accessed 21 May 2018
G. Cheliotis, Social network analysis. LinkedIn SlideShare (2010), https://www.slideshare.net/gcheliotis/social-network-analysis-3273045. Accessed 25 May 2018
S.F. Everton, Strategic options for disrupting dark networks, in Disrupting Dark Networks, (Cambridge University Press, New York, 2012), pp. 32–46. https://doi.org/10.1017/cbo9781139136877.004
F. Şen, R. Wigand, N. Agarwal, et al., Focal structures analysis: identifying influential sets of individuals in a social network. Soc. Netw. Anal. Min. 6, 17 (2016). https://doi.org/10.1007/s13278-016-0319-z
M. Girvan, M.E.J. Newman, Community structure in social and biological networks. PNAS 99(12), 7821–7826 (2002)
V.D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Fast unfolding of communities in large networks. J. Stat. Mech: Theory Exp. 2008, P10008 (2008). https://doi.org/10.1088/1742-5468/2008/10/p10008
P. Jaccard, The distribution of the flora in the alpine zone. New Phytol. 11(2), 37–50 (1912)
N. Agarwal, H. Liu, L. Tang, P.S. Yu, Identifying the influential bloggers in a community, in Proceedings of the International Conference on Web Search and Web Data Mining - WSDM 08 (2008). https://doi.org/10.1145/1341531.1341559
N. Agarwal et al., Modeling blogger influence in a community. Soc. Netw. Anal. Min. 2(2), 139–162 (2012)
S. Kumar et al., Convergence of influential bloggers for topic discovery in the blogosphere, in International Conference on Social Computing, Behavioral Modeling, and Prediction, ed. by S.-K. Chai et al. (Springer, Berlin 2010), pp. 406–412
A. Java, P. Kolari, T. Finin, T. Oates, Modeling the spread of influence on the blogosphere, in Proceedings of the 15th International World Wide Web Conference (2006), pp. 22–26
K.E. Gill, How can we measure the influence of the blogosphere, in WWW 2004 Workshop on the Weblogging Ecosystem: Aggregation, Analysis and Dynamics (2004)
A.J. Girao, Tried and tested, in NATO Summit 2016 – Strengthening Peace and Security (2016), pp. 105–107
Sputnik, Activistas españoles preparan movilizaciones contra la OTAN. Sputnik Mundo (2015), http://mundo.sputniknews.com/espana/20150819/1040501131.html. Accessed 20 Aug 2015
Sputnik, Nato-Soldaten trainieren Kampf in sozialen Netzwerken. Sputnik Deutschland (2015), http://de.sputniknews.com/militar/20150828/304057978.html. Accessed 2 Sep 2015
Sputnik, NATO drills jeopardize Spanish residents’ health, environment - politician. Sputnik International (2015), http://sputniknews.com/military/20150902/1026475239/nato-drills-zaragoza.html. Accessed 2 Sep 2015
L. Alexander, Open-source information reveals pro-kremlin web campaign. Global Voices (2015), https://globalvoices.org/2015/07/13/open-source-information-reveals-pro-kremlin-web-campaign. Accessed 21 May 2018
M. Bazzell, Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information (Createspace Independent Publishing, Charleston, 2016)
B. Etling, J. Kelly, R. Faris, J. Palfrey, Mapping the Arabic blogosphere: politics, culture, and dissent, vol 6 (Berkman Center for Internet & Society, Cambridge, 2009)
R.B. Standler, Propaganda and how to recognize it (RBS0), www.rbs0.com/propaganda.pdf. Accessed 2 Sep 2005
Operation Atlantic Resolve Exercises Begin in Eastern Europe. U.S. Department of Defense. https://www.defense.gov/News/Article/Article/604341/operation-atlantic-resolve-exercises-begin-in-eastern-europe/. Accessed 21 May 2018
‘Tanks? No thanks!’: Czechs unhappy about US military convoy crossing country. RT International. https://www.rt.com/news/243073-czech-protest-us-tanks/. Accessed 21 May 2018
D. Sindelar, U.S. Convoy, in Czech Republic, Real-Life Supporters Outnumber Virtual Opponents, Radio Free Europe/Radio Liberty (2015)
Sputnik, Czechs plan multiple protests of US Army’s ‘operation dragoon ride’. Sputnik International (2015), https://sputniknews.com/europe/201503281020135278/. Accessed 21 May 2018
S. Ghosh, B. Viswanath, F. Kooti, et al., Understanding and combating link farming in the twitter social network, in Proceedings of the 21st international conference on World Wide Web - WWW 12 (2012). https://doi.org/10.1145/2187836.2187846
V. Labatut, N. Dugue, A. Perez, Identifying the community roles of social capitalists in the Twitter network, in 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014) (2014). https://doi.org/10.1109/asonam.2014.6921612
S. Al-Khateeb, N. Agarwal, Understanding strategic information manoeuvres in network media to advance cyber operations: a case study analysing pro-Russian separatists’ cyber information operations in Crimean water crisis. J. Balt. Secur. 2, 6 (2016). https://doi.org/10.1515/jobs-2016-0028
N. Agarwal, S. Al-Khateeb, R. Galeano, R. Goolsby, Examining the use of botnets and their evolution in propaganda dissemination. Def. Strateg. Commun. 2, 87–112 (2017). https://doi.org/10.30966/2018.riga.2.4
Şen F, Wigand R, Agarwal N, et al., Focal Structure Analysis in Large Biological Networks, in IPCBEE (2014 3rd International Conference on Environment Energy and Biotechnology), vol. 70 (IACSIT Press, Singapore, 2014), p. 1
S. Yuce et al., Studying the evolution of online collective action: Saudi Arabian Women’s “Oct26Driving” Twitter campaign, in International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, ed. by W.G. Kennedy et al. (Springer, Cham, 2014), pp. 413–420
Graham Phillips is a British national contracted as a stringer by the Russian Times (RT). He has produced numerous videos, blogs, and stories in and around eastern Ukraine. He speaks and writes in Russian and English in his reports. He recently spent time covering the World Cup in Brazil for RT and has re-entered Eastern Ukraine as of July 2014. RT reported on that Phillips was deported from Ukraine because he works for RT. He will not be allowed to re-enter Ukraine for three years.
M. Seddon, How a British blogger became an unlikely star of the Ukraine conflict - and Russia Today. BuzzFeed, https://www.buzzfeed.com/maxseddon/how-a-british-blogger-became-an-unlikely-star-of-the-ukraine?utm_term=.poaNaBd7w#.ikzWz90Ny. Accessed 21 May 2018
Acknowledgment
This research is funded in part by the U.S. National Science Foundation (IIS-1636933, ACI-1429160, and IIS-1110868), U.S. Office of Naval Research (N00014-10-1-0091, N00014-14-1-0489, N00014-15-P-1187, N00014-16-1-2016, N00014-16-1-2412, N00014-17-1-2605, N00014-17-1-2675), U.S. Air Force Research Lab, U.S. Army Research Office (W911NF-16-1-0189), U.S. Defense Advanced Research Projects Agency (W31P4Q-17-C-0059), the Jerry L. Maulden/Entergy Fund at the University of Arkansas at Little Rock, the Arkansas Research Alliance, and Creighton University’s College of Arts and Sciences. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding organizations. The researchers gratefully acknowledge the support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Galeano, K., Galeano, R., Al-Khateeb, S., Agarwal, N. (2020). Studying the Weaponization of Social Media: Case Studies of Anti-NATO Disinformation Campaigns. In: Tayebi, M.A., Glässer, U., Skillicorn, D.B. (eds) Open Source Intelligence and Cyber Crime. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-41251-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-41251-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-41250-0
Online ISBN: 978-3-030-41251-7
eBook Packages: Computer ScienceComputer Science (R0)