Skip to main content

Studying the Weaponization of Social Media: Case Studies of Anti-NATO Disinformation Campaigns

  • Chapter
  • First Online:
Open Source Intelligence and Cyber Crime

Part of the book series: Lecture Notes in Social Networks ((LNSN))

  • 1536 Accesses

Abstract

Social media provides a fertile ground for any user to find or share information about various events with others. At the same time, social media is not always used for benign purposes. With the availability of inexpensive and ubiquitous mass communication tools, disseminating false information and propaganda is both convenient and effective. In this research, we studied Online Deviant Groups (ODGs) that conduct cyber propaganda campaigns in order to achieve strategic and political goals, influence mass thinking, and steer behaviors or perspectives about an event. We provide case studies in which various disinformation and propaganda swamped social media during two NATO exercises in 2015. We demonstrate ODGs’ capability to spread anti-NATO propaganda using a highly sophisticated and well-coordinated social media campaign. In particular, blogs were used as virtual spaces where narratives are framed. And, to generate discourse, web traffic was driven to these virtual spaces via other social media platforms such as Twitter, Facebook, and VKontakte. By further examining the information flows within the social media networks, we identify sources of mis/disinformation and their reach, i.e., how far and how quickly the mis/disinformation could travel and consequently detect manipulation. The chapter presents an in-depth examination of the information networks using social network analysis (SNA) and social cyber forensics (SCF) based methodologies to identify prominent information brokers, leading coordinators, and information competitors who seek to further their own agenda. Through SCF tools, e.g., Maltego, we extract metadata associated with disinformation-riddled websites. The extracted metadata helps in uncovering the implicit relations among various ODGs. We further collected the social network of various ODGs (i.e., their friends and followers) and their communication network (i.e., network depicting the flow of information such as tweets, retweets, mentions, and hyperlinks). SNA helped us identify influential users and powerful groups responsible for coordinating the various disinformation campaigns. One of the key research findings is the vitality of the link between blogs and other social media platforms to examine disinformation campaigns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A person who disseminates provocative posts on social media for the troll's amusement or because (s)he was paid to do so.

References

  1. Professor describes Atari’s impact on gaming world. Technique, http://nique.net/life/2009/02/20/professor-describes-ataris-impact-on-gaming-world/. Accessed 1 May 2018

  2. M. Zuckerberg, Biography.com, https://www.biography.com/people/mark-zuckerberg-507402. Accessed 3 May 2018

  3. C. Gallo, Jeff Bezos banned powerpoint in meetings. His replacement is brilliant. Inc.com (2018), https://www.inc.com/carmine-gallo/jeff-bezos-bans-powerpoint-in-meetings-his-replacement-is-brilliant.html. Accessed 28 Apr 2018

  4. D. Volkov, Supporting a war that isn’t: Russian public opinion and the Ukraine conflict. Carnegie Moscow Center (2015), https://carnegie.ru/commentary/61236. Accessed 9 Jan 2019

  5. D.V. Gioe, Cyber operations and useful fools: the approach of Russian hybrid intelligence. Intell. Natl. Secur. 33, 954–973 (2018). https://doi.org/10.1080/02684527.2018.1479345

    Article  Google Scholar 

  6. S. Tatham, Strategic Communication: A Primer (Defence Academy of the United Kingdom, Conflict Studies Research Centre, Camberley, 2008)

    Google Scholar 

  7. S.P. Borgatti, Centrality and network flow. Soc. Networks 27, 55–71 (2005). https://doi.org/10.1016/j.socnet.2004.11.008

    Article  Google Scholar 

  8. M.K. Sparrow, The application of network analysis to criminal intelligence: an assessment of the prospects. Soc. Networks 13, 251–274 (1991). https://doi.org/10.1016/0378-8733(91)90008-h

    Article  Google Scholar 

  9. R.B. Cialdini, Influence: Psychology of Persuasion (Collins Business, New York, 1993)

    Google Scholar 

  10. Senior Research Psychologist – Connections, amazon.jobs, https://www.amazon.jobs/en/jobs/655074/senior-research-psychologist-connections. Accessed 20 May 2018

  11. R.A. Rodríguez-Gómez, G. Maciá-Fernández, P. García-Teodoro, Survey and taxonomy of botnet research through life-cycle. ACM Comput. Surv. 45, 1–33 (2013). https://doi.org/10.1145/2501654.2501659

    Article  Google Scholar 

  12. M.S. Ackerman, J. Muramatsu, D.W. Mcdonald, Social regulation in an online game, in Proceedings of the 16th ACM International Conference on Supporting Group Work - GROUP 10 (2010). https://doi.org/10.1145/1880071.1880101

  13. S. Hegelich, D. Janetzko, Are social bots on Twitter political actors? Empirical evidence from a Ukrainian social botnet, in Proceedings of the Tenth International AAAI Conference on Web and Social Media (International AAAI Conference on Web and Social Media (ICWSM-16) (2016)

    Google Scholar 

  14. A. Karasaridis, B. Rexroad, D. Hoeflin, Wide-scale botnet detection and characterization, in Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets (HotBots’07) (USENIX Association, Berkeley, CA, 2007), p. 7-7

    Google Scholar 

  15. N. Abokhodair et al., Dissecting a social botnet: growth, content and influence in Twitter, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW ’15, ed. by D. Cosley et al. (ACM, New York, 2015), pp. 839–851

    Google Scholar 

  16. S. Al-khateeb, N. Agarwal, Examining botnet behaviors for propaganda dissemination: a case study of ISIL’s beheading videos-based propaganda, in Proceedings of the Behavior Analysis, Modeling, and Steering (BEAMS 2015) co-located with the IEEE International Conference on Data Mining (ICDM 2015) (2015)

    Google Scholar 

  17. Z. Chu et al., Who is tweeting on Twitter: human, bot, or cyborg? in Conference, 2010 Annual Computer Security Applications Conference (ACSAC 2010), Austin, TX, USA - December 06 - 10, 2010 (ACM, New York, 2010), pp. 21–30

    Google Scholar 

  18. G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, B.Y. Zhao, Social turing tests: crowdsourcing sybil detection, in The Network and Distributed System Security Symposium (NDSS) (The Internet Society, 2013)

    Google Scholar 

  19. E. Ferrara, O. Varol, C. Davis, et al., The rise of social bots. Commun. ACM 59, 96–104 (2016). https://doi.org/10.1145/2818717

    Article  Google Scholar 

  20. V. Subrahmanian, A. Azaria, S. Durst, et al., The DARPA Twitter bot challenge. Computer 49, 38–46 (2016). https://doi.org/10.1109/mc.2016.183

    Article  Google Scholar 

  21. N. Alherbawi, Z. Shukur, R. Sulaiman, Systematic literature review on data carving in digital forensic. Procedia Technol. 11, 86–92 (2013). https://doi.org/10.1016/j.protcy.2013.12.165

    Article  Google Scholar 

  22. K. Oyeusi, Computer Forensics (London Metropolitan University, London, 2009)

    Google Scholar 

  23. M. Mulazzani, M. Huber, E. Weippl, Social network forensics: tapping the data pool of social networks, in Eighth Annual IFIP WG, vol. 11 (2012)

    Google Scholar 

  24. N.A. Mutawa, I. Baggili, A. Marrington, Forensic analysis of social networking applications on mobile devices. Digit. Investig. 9, S24 (2012). https://doi.org/10.1016/j.diin.2012.05.007

    Article  Google Scholar 

  25. N.A. Mutawa, I.A. Awadhi, I.M. Baggili, A. Marrington, Forensic artifacts of Facebook’s instant messaging service, in 2011 International Conference for Internet Technology and Secured Transactions (2011), pp. 771–776

    Google Scholar 

  26. K.M. Carley, J. Reminga, ORA: organization risk analyzer. Technical Report, Carnegie Mellon University, School of Computer Science, Institute for Software Research International (2004), http://www.casos.cs.cmu.edu/publications/papers/carley_2004_oraorganizationrisk.pdf. Accessed 21 May 2018

  27. G. Cheliotis, Social network analysis. LinkedIn SlideShare (2010), https://www.slideshare.net/gcheliotis/social-network-analysis-3273045. Accessed 25 May 2018

  28. S.F. Everton, Strategic options for disrupting dark networks, in Disrupting Dark Networks, (Cambridge University Press, New York, 2012), pp. 32–46. https://doi.org/10.1017/cbo9781139136877.004

    Chapter  Google Scholar 

  29. F. Şen, R. Wigand, N. Agarwal, et al., Focal structures analysis: identifying influential sets of individuals in a social network. Soc. Netw. Anal. Min. 6, 17 (2016). https://doi.org/10.1007/s13278-016-0319-z

    Article  Google Scholar 

  30. M. Girvan, M.E.J. Newman, Community structure in social and biological networks. PNAS 99(12), 7821–7826 (2002)

    Article  MathSciNet  Google Scholar 

  31. V.D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Fast unfolding of communities in large networks. J. Stat. Mech: Theory Exp. 2008, P10008 (2008). https://doi.org/10.1088/1742-5468/2008/10/p10008

    Article  MATH  Google Scholar 

  32. P. Jaccard, The distribution of the flora in the alpine zone. New Phytol. 11(2), 37–50 (1912)

    Article  Google Scholar 

  33. N. Agarwal, H. Liu, L. Tang, P.S. Yu, Identifying the influential bloggers in a community, in Proceedings of the International Conference on Web Search and Web Data Mining - WSDM 08 (2008). https://doi.org/10.1145/1341531.1341559

  34. N. Agarwal et al., Modeling blogger influence in a community. Soc. Netw. Anal. Min. 2(2), 139–162 (2012)

    Article  Google Scholar 

  35. S. Kumar et al., Convergence of influential bloggers for topic discovery in the blogosphere, in International Conference on Social Computing, Behavioral Modeling, and Prediction, ed. by S.-K. Chai et al. (Springer, Berlin 2010), pp. 406–412

    Google Scholar 

  36. A. Java, P. Kolari, T. Finin, T. Oates, Modeling the spread of influence on the blogosphere, in Proceedings of the 15th International World Wide Web Conference (2006), pp. 22–26

    Google Scholar 

  37. K.E. Gill, How can we measure the influence of the blogosphere, in WWW 2004 Workshop on the Weblogging Ecosystem: Aggregation, Analysis and Dynamics (2004)

    Google Scholar 

  38. A.J. Girao, Tried and tested, in NATO Summit 2016 – Strengthening Peace and Security (2016), pp. 105–107

    Google Scholar 

  39. Sputnik, Activistas españoles preparan movilizaciones contra la OTAN. Sputnik Mundo (2015), http://mundo.sputniknews.com/espana/20150819/1040501131.html. Accessed 20 Aug 2015

  40. Sputnik, Nato-Soldaten trainieren Kampf in sozialen Netzwerken. Sputnik Deutschland (2015), http://de.sputniknews.com/militar/20150828/304057978.html. Accessed 2 Sep 2015

  41. Sputnik, NATO drills jeopardize Spanish residents’ health, environment - politician. Sputnik International (2015), http://sputniknews.com/military/20150902/1026475239/nato-drills-zaragoza.html. Accessed 2 Sep 2015

  42. L. Alexander, Open-source information reveals pro-kremlin web campaign. Global Voices (2015), https://globalvoices.org/2015/07/13/open-source-information-reveals-pro-kremlin-web-campaign. Accessed 21 May 2018

  43. M. Bazzell, Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information (Createspace Independent Publishing, Charleston, 2016)

    Google Scholar 

  44. B. Etling, J. Kelly, R. Faris, J. Palfrey, Mapping the Arabic blogosphere: politics, culture, and dissent, vol 6 (Berkman Center for Internet & Society, Cambridge, 2009)

    Google Scholar 

  45. R.B. Standler, Propaganda and how to recognize it (RBS0), www.rbs0.com/propaganda.pdf. Accessed 2 Sep 2005

  46. Operation Atlantic Resolve Exercises Begin in Eastern Europe. U.S. Department of Defense. https://www.defense.gov/News/Article/Article/604341/operation-atlantic-resolve-exercises-begin-in-eastern-europe/. Accessed 21 May 2018

  47. ‘Tanks? No thanks!’: Czechs unhappy about US military convoy crossing country. RT International. https://www.rt.com/news/243073-czech-protest-us-tanks/. Accessed 21 May 2018

  48. D. Sindelar, U.S. Convoy, in Czech Republic, Real-Life Supporters Outnumber Virtual Opponents, Radio Free Europe/Radio Liberty (2015)

    Google Scholar 

  49. Sputnik, Czechs plan multiple protests of US Army’s ‘operation dragoon ride’. Sputnik International (2015), https://sputniknews.com/europe/201503281020135278/. Accessed 21 May 2018

  50. S. Ghosh, B. Viswanath, F. Kooti, et al., Understanding and combating link farming in the twitter social network, in Proceedings of the 21st international conference on World Wide Web - WWW 12 (2012). https://doi.org/10.1145/2187836.2187846

  51. V. Labatut, N. Dugue, A. Perez, Identifying the community roles of social capitalists in the Twitter network, in 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014) (2014). https://doi.org/10.1109/asonam.2014.6921612

  52. S. Al-Khateeb, N. Agarwal, Understanding strategic information manoeuvres in network media to advance cyber operations: a case study analysing pro-Russian separatists’ cyber information operations in Crimean water crisis. J. Balt. Secur. 2, 6 (2016). https://doi.org/10.1515/jobs-2016-0028

    Article  Google Scholar 

  53. N. Agarwal, S. Al-Khateeb, R. Galeano, R. Goolsby, Examining the use of botnets and their evolution in propaganda dissemination. Def. Strateg. Commun. 2, 87–112 (2017). https://doi.org/10.30966/2018.riga.2.4

    Article  Google Scholar 

  54. Şen F, Wigand R, Agarwal N, et al., Focal Structure Analysis in Large Biological Networks, in IPCBEE (2014 3rd International Conference on Environment Energy and Biotechnology), vol. 70 (IACSIT Press, Singapore, 2014), p. 1

    Google Scholar 

  55. S. Yuce et al., Studying the evolution of online collective action: Saudi Arabian Women’s “Oct26Driving” Twitter campaign, in International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, ed. by W.G. Kennedy et al. (Springer, Cham, 2014), pp. 413–420

    Google Scholar 

  56. Graham Phillips is a British national contracted as a stringer by the Russian Times (RT). He has produced numerous videos, blogs, and stories in and around eastern Ukraine. He speaks and writes in Russian and English in his reports. He recently spent time covering the World Cup in Brazil for RT and has re-entered Eastern Ukraine as of July 2014. RT reported on that Phillips was deported from Ukraine because he works for RT. He will not be allowed to re-enter Ukraine for three years.

    Google Scholar 

  57. M. Seddon, How a British blogger became an unlikely star of the Ukraine conflict - and Russia Today. BuzzFeed, https://www.buzzfeed.com/maxseddon/how-a-british-blogger-became-an-unlikely-star-of-the-ukraine?utm_term=.poaNaBd7w#.ikzWz90Ny. Accessed 21 May 2018

Download references

Acknowledgment

This research is funded in part by the U.S. National Science Foundation (IIS-1636933, ACI-1429160, and IIS-1110868), U.S. Office of Naval Research (N00014-10-1-0091, N00014-14-1-0489, N00014-15-P-1187, N00014-16-1-2016, N00014-16-1-2412, N00014-17-1-2605, N00014-17-1-2675), U.S. Air Force Research Lab, U.S. Army Research Office (W911NF-16-1-0189), U.S. Defense Advanced Research Projects Agency (W31P4Q-17-C-0059), the Jerry L. Maulden/Entergy Fund at the University of Arkansas at Little Rock, the Arkansas Research Alliance, and Creighton University’s College of Arts and Sciences. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding organizations. The researchers gratefully acknowledge the support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitin Agarwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Galeano, K., Galeano, R., Al-Khateeb, S., Agarwal, N. (2020). Studying the Weaponization of Social Media: Case Studies of Anti-NATO Disinformation Campaigns. In: Tayebi, M.A., Glässer, U., Skillicorn, D.B. (eds) Open Source Intelligence and Cyber Crime. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-41251-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41251-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41250-0

  • Online ISBN: 978-3-030-41251-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics