Abstract
While substantial research has focused on social bot classification, less computational effort has focused on repeatable bot characterization. Binary classification into “bot” or “not bot” is just the first step in social cybersecurity workflows. Characterizing the malicious actors is the next step. To that end, this paper will characterize data associated with state sponsored manipulation by Russia and the People’s Republic of China. The data studied here was associated with information manipulation by state actors, the accounts were suspended by Twitter and subsequently all associated data was released to the public. Of the multiple data sets that Twitter released, we will focus on the data associated with the Russian Internet Research Agency and the People’s Republic of China. The goal of this paper is to compare and contrast these two important data sets while simultaneously developing repeatable workflows to characterize information operations for social cybersecurity.
Keywords
- Bot characterization
- Social cybersecurity
- Disinformation
- Information operations
- Strategic competition
- Propaganada
- Exploratory data analysis
- Internet memes
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alvarez, P., Hosking, T.: The full text of Mueller’s indictment of 13 Russians’. The Atlantic, 16th Feb (2018)
Badawy, A., Addawood, A., Lerman, K., Ferrara, E.: Characterizing the 2016 Russian IRA influence campaign. Soc. Netw. Anal. Min. 9(1), 31 (2019)
Beskow, D., Carley, K.M.: Bot conversations are different: leveraging network metrics for bot detection in twitter. In: Advances in Social Networks Analysis and Mining (ASONAM), 2018 International Conference on, pp. 176–183. IEEE (2018)
Beskow, D., Carley, K.M.: Introducing bothunter: a tiered approach to detection and characterizing automated activity on twitter. In: Bisgin, H., Hyder, A., Dancy, C., Thomson, R. (eds.) International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation. Springer (2018)
Beskow, D.M., Carley, K.M.: Army must regain initiative in social cyberwar. Army Mag. 69(8), 24–28 (2019)
Beskow, D.M., Carley, K.M.: Social cybersecurity: an emerging national security requirement. Mil. Rev. 99(2), 117 (2019)
Bowles, N.: The mainstreaming of political memes online. New York Times (Feb 2018). https://www.nytimes.com/interactive/2018/02/09/technology/political-memes-go-mainstream.html
Chavoshi, N., Hamooni, H., Mueen, A.: Debot: twitter bot detection via warped correlation. In: ICDM, pp. 817–822 (2016)
Chen, A.: The agency. N. Y. Times 2(6), 2015 (2015)
Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: a system to evaluate social bots. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 273–274. International World Wide Web Conferences Steering Committee (2016)
Dawkins, R.: The Selfish Gene: With a New Introduction by the Author. Oxford University Press, Oxford (2006). (Originally published in 1976)
DiResta, R., Shaffer, K., Ruppel, B., Sullivan, D., Matney, R., Fox, R., Albright, J., Johnson, B.: The Tactics & Tropes of the Internet Research Agency. New Knowledge, New York (2018)
Faris, R., Villeneuve, N.: Measuring global internet filtering. In: Access Denied: The Practice and Policy of Global Internet Filtering, vol. 5. MIT Press, Cambridge (2008)
Howard, P.N., Ganesh, B., Liotsiou, D., Kelly, J., François, C.: The IRA, Social Media and Political Polarization in the United States, 2012–2018. University of Oxford, Oxford (2018)
McDonell, S.: Why China censors banned Winnie the pooh – BBC news. https://www.bbc.com/news/blogs-china-blog-40627855 (July 2017). Accessed 29 Sep 2019
Mueller, R.S.: Report on the Investigation into Russian Interference in the 2016 Presidential Election. US Department of Justice, Washington (2019)
Nimmo, B., Brookie, G., Karan, K.: #trolltracker: twitter troll farm archives – DFRLAB – medium. https://file:///Users/dbeskow/Dropbox/CMU/bot_labels/references/ira/%23TrollTracker_%20Twitter%20Troll%20Farm%20Archives%20-%20DFRLab%20-%20Medium.html. Accessed 23 Sep 2019
Safety, T.: Information operations directed at Hong Kong. https://blog.twitter.com/en_us/topics/company/2019/information_operations_directed_at_Hong_Kong.html (August 2019). Accessed 26 Sep 2019
National Academies of Sciences, Engineering, and Medicine: A Decadal Survey of the Social and Behavioral Sciences: A Research Agenda for Advancing Intelligence Analysis. The National Academies Press, Washington (2019). https://doi.org/10.17226/25335, https://www.nap.edu/catalog/25335/a-decadal-survey-of-the-social-and-behavioral-sciences-a
Shifman, L.: The cultural logic of photo-based meme genres. J. Vis. Cult. 13(3), 340–358 (2014)
Shifman, L.: Memes in digital culture. MIT Press, London (2014)
Uren, T., Thomas, E., Wallis, J.: Tweeting Through the Great Firewall: Preliminary Analysis of PRC-linked Information Operations on the Hong Kong Portest. Australia Strategic Policy Institute: International Cyber Policy Center, Barton (2019)
Von Nordheim, G., Boczek, K., Koppers, L.: Sourcing the sources: An analysis of the use of twitter and facebook as a journalistic source over 10 years in the New York times, the guardian, and süddeutsche zeitung. Digit. Journal. 6(7), 807–828 (2018)
Acknowledgements
This work was supported in part by the Office of Naval Research (ONR) Award N00014182106 and Award N000141812108, and the Center for Computational Analysis of Social and Organization Systems (CASOS). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the ONR or the U.S. government.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Beskow, D.M., Carley, K.M. (2020). Characterization and Comparison of Russian and Chinese Disinformation Campaigns. In: Shu, K., Wang, S., Lee, D., Liu, H. (eds) Disinformation, Misinformation, and Fake News in Social Media. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-42699-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-42699-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-42698-9
Online ISBN: 978-3-030-42699-6
eBook Packages: Computer ScienceComputer Science (R0)