Skip to main content

Leveraging Social Network Analysis and Cyber Forensics Approaches to Study Cyber Propaganda Campaigns

  • Chapter
  • First Online:
Social Networks and Surveillance for Society

Abstract

In today’s information technology age, our political discourse is shrinking to fit our smartphone screens. Further, with the availability of inexpensive and ubiquitous mass communication tools like social media, disseminating false information and propaganda is both convenient and effective. Groups use social media to coordinate cyber propaganda campaigns in order to achieve strategic and political goals, influence mass thinking, and steer behaviors or perspectives about an event. In this research, we study the online deviant groups (ODGs) who created a lot of cyber propaganda that were projected against the NATO’s Trident Juncture Exercise 2015 (TRJE 2015) on both Twitter and blogs. Anti-NATO narratives were observed on social media websites that got stronger as the TRJE 2015 event approached. Call for civil disobedience, planned protests, and direct action against TRJE 2015 propagated on social media websites. We employ computational social network analysis and cyber forensics informed methodologies to study information competitors who seek to take the initiative and the strategic message away from NATO in order to further their own agenda. Through social cyber forensics tools, e.g., Maltego, we extract metadata associated with propaganda-riddled websites. The extracted metadata helps in the collection of social network information (i.e., friends and followers) and communication network information (i.e., network depicting the flow of information such as tweets, retweets, mentions, and hyperlinks). Through computational social network analysis, we identify influential users and powerful groups (or the focal structures) coordinating the cyber propaganda campaigns. The study examines 21 blogs having over 18,000 blog posts dating back to 1997 and over 9000 Twitter users for the period between August 3, 2014, and September 12, 2015. These blogs were identified, crawled, and stored in our database that is accessible through the Blogtrackers tool. Blogtrackers tool further helped us identify the activity patterns of blogs, keyword patterns, and the influence a blog or a blogger has on the community, and analyze the sentiment diffusion in the community.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Trident Juncture: NATO’s Largest Military Exercise since Cold War. The “Fictitious Target” is Russia (GlobalResearch.ca, available at http://bit.ly/294Uo2E)

  2. 2.

    War game whoops! NATO exercises end with hovercraft, Humvees stuck in sand (VIDEO) (RT.com, available at http://bit.ly/298ya0R)

  3. 3.

    YOU WON’T BELIEVE WHAT NATO IS DOING TO PREPARE FOR WORLD WAR 3! (YouTube.com, available at http://bit.ly/29bcH7P)

  4. 4.

    Maltego, available at www.paterva.com/web6/products/maltego.php

  5. 5.

    Paterva (Pty) Ltd. a new train of thought, available at www.paterva.com

  6. 6.

    Scraawl, available at www.scraawl.com

  7. 7.

    ORA NetScenes, available at http://bit.ly/27fuHnv

References

  1. R.Y.K. Lau, Y. Xia, Y. Ye, A probabilistic generative model for mining cybercriminal networks from online social media. IEEE Comput. Intell. Mag. 9(1), 31–43 (2014)

    Article  Google Scholar 

  2. S. Al-khateeb, N. Agarwal, Analyzing flash mobs in cybernetic space and the imminent security threats a collective action based theoretical perspective on emerging sociotechnical behaviors. In 2015 AAAI Spring Symposium Series, March 2015

    Google Scholar 

  3. B. Wright, Social media and the changing role of investigators. Forensic Mag. December, 2012

    Google Scholar 

  4. M. Mulazzani, M. Huber, E. Weippl, Social network forensics: tapping the data pool of social networks, presented at the 8th annual IFIP WG, 2012, vol. 11

    Google Scholar 

  5. D. Povar, V.K. Bhadran, Forensic data carving, in Digital Forensics and Cyber Crime, vol. 53 (Springer, Berlin, Heidelberg, 2011), pp. 137–148

    Google Scholar 

  6. S. Saleem, P. Popov, I. Bagilli, Extended abstract digital forensics model with preservation and protection as umbrella principles, presented at the 18th international conference on knowledge-based and intelligent information & engineering systems—KES2014, Gdynia, Poland, 2014, vol. 35, pp. 812–821

    Google Scholar 

  7. L. Alexander, Open-source information reveals Pro-Kremlin web campaign. (2015). Dostęp: https://globalvoices.org/2015/07/13/open-source-information-reveals-pro-kremlin-web-campaign/ Accessed 25 May 2017

  8. M.A. Smith et al., Analyzing (social media) networks with NodeXL, in Proceedings of the Fourth International Conference on Communities and Technologies, 2009, pp. 255–264

    Google Scholar 

  9. F. Sen, R. Wigand, N. Agarwal, S. Yuce, R. Kasprzyk, Focal structures analysis: Identifying influential sets of individuals in a social network. Soc. Netw. Anal. Min. 6, 1–22 (2016)

    Article  Google Scholar 

  10. N. Agarwal, S. Kumar, H. Liu, M. Woodward, BlogTrackers: a tool for sociologists to track and analyze blogosphere. In ICWSM, March 2009

    Google Scholar 

  11. N. Alherbawi, Z. Shukur, R. Sulaiman, Systematic literature review on data carving in digital forensic, in Procedia Technology, 2013, vol. 11, pp. 86–92

    Google Scholar 

  12. K. Oyeusi, Computer Forensics (London Metropolitan University, London, 2009)

    Google Scholar 

  13. N. Al Mutawa, I. Baggili, A. Marrington, Forensic analysis of social networking applications on mobile devices. Digit. Invest. 9, S24–S33 (2012)

    Article  Google Scholar 

  14. N. Al Mutawa, I. Al Awadhi, I. Baggili, A. Marrington, Forensic artifacts of Facebook’s instant messaging service, presented at the 2011 international conference for internet technology and secured transactions (ICITST), 2011, pp. 771–776

    Google Scholar 

  15. M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, E. Weippl Social snapshots: digital forensics for online social networks, presented at the proceedings of the 27th annual computer security applications conference, ACM, 2011, pp. 113–122

    Google Scholar 

  16. N. Abokhodair, D. Yoo, D.W. McDonald, Dissecting a social botnet: growth, Content and Influence in Twitter, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015, pp. 839–851

    Google Scholar 

  17. S. Al-khateeb, N. Agarwal, Examining Botnet behaviors for propaganda dissemination: a case study of ISIL’s beheading videos-based propaganda, presented at the data mining workshop (ICDMW), 2015 IEEE international conference on, 2015, pp. 51–57

    Google Scholar 

  18. S. Al-khateeb, M. Hussain, N. Agarwal, Exploring ISIL cyber network activities: evolution, means, and strategies, in XXXVI International Sunbelt Social Network Conference, Newport Beach, CA, p. 4

    Google Scholar 

  19. S. Al-khateeb, N. Agarwal, Understanding strategic information Manoeuvres in network media to advance cyber operations: a case study analysing pro-Russian separatists’ cyber information operations in Crimean water crisis. J. Balt. Secur. 2(1), 6–17 (2016)

    Article  Google Scholar 

  20. N. Agarwal, S. Al-khateeb, R. Galeano, R. Goolsby, Examining the use of botnets and their evolution in propaganda dissemination. Def. Strateg. Commun. 2(2), 87–112 (2017)

    Article  Google Scholar 

  21. N. Agarwal, H. Liu, L. Tang, S.Y. Philip, Modeling blogger influence in a community. Soc. Netw. Anal. Min. 2(2), 139–162 (2012)

    Article  Google Scholar 

  22. N. Agarwal, H. Liu, L. Tang, P.S. Yu, Identifying the influential bloggers in a community, in Proceedings of the 2008 International Conference on Web Search and Data Mining, 2008, pp. 207–218

    Google Scholar 

  23. S. Kumar, R. Zafarani, M.A. Abbasi, G. Barbier, H. Liu, Convergence of influential bloggers for topic discovery in the blogosphere, in Advances in Social Computing, 2010, pp. 406–412

    Google Scholar 

  24. A. Java, P. Kolari, T. Finin, T. Oates, “Modeling the spread of influence on the blogosphere,” in Proceedings of the 15th International World Wide Web Conference, 2006, pp. 22–26

    Google Scholar 

  25. K.E. Gill, How can we measure the influence of the blogosphere, in WWW 2004 Workshop on the Weblogging Ecosystem: Aggregation, Analysis and Dynamics, 2004

    Google Scholar 

  26. M. Bazzell, Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 4th edn (CCI Publishing, 2014)

    Google Scholar 

  27. B. Etling, J. Kelly, R. Faris, J. Palfrey, Mapping the Arabic blogosphere: politics, culture, and dissent, in Media Evolution on the Eve of the Arab Spring, ed. by L. Hudson, A. Iskandar, M. Kirk (Palgrave Macmillan, New York, 2014), pp. 49–74

    Google Scholar 

  28. R.B. Standler, Propaganda and How to Recognize it, RBS0, 02-Sep-2005

    Google Scholar 

Download references

Acknowledgements

This research is funded in part by the U.S. National Science Foundation (IS-1636933, IIS-1110868 and ACI-1429160), U.S. Office of Naval Research (N000141010091, N000141410489, N0001415P1187, N000141612016, N000141612412, N00014-17-1-2605, and N00014-17-1-2675), U.S. Air Force Research Lab, U.S. Army Research Office (W911NF-16-1-0189), U.S. Defense Advanced Research Projects Agency (W31P4Q-17-C-0059), and the Jerry L. Maulden/Entergy Fund at the University of Arkansas at Little Rock. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding organizations. The researchers gratefully acknowledge the support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samer Al-Khateeb .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Al-Khateeb, S., Hussain, M.N., Agarwal, N. (2019). Leveraging Social Network Analysis and Cyber Forensics Approaches to Study Cyber Propaganda Campaigns. In: Özyer, T., Bakshi, S., Alhajj, R. (eds) Social Networks and Surveillance for Society. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-78256-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78256-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78255-3

  • Online ISBN: 978-3-319-78256-0

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics