Abstract
In today’s information technology age, our political discourse is shrinking to fit our smartphone screens. Further, with the availability of inexpensive and ubiquitous mass communication tools like social media, disseminating false information and propaganda is both convenient and effective. Groups use social media to coordinate cyber propaganda campaigns in order to achieve strategic and political goals, influence mass thinking, and steer behaviors or perspectives about an event. In this research, we study the online deviant groups (ODGs) who created a lot of cyber propaganda that were projected against the NATO’s Trident Juncture Exercise 2015 (TRJE 2015) on both Twitter and blogs. Anti-NATO narratives were observed on social media websites that got stronger as the TRJE 2015 event approached. Call for civil disobedience, planned protests, and direct action against TRJE 2015 propagated on social media websites. We employ computational social network analysis and cyber forensics informed methodologies to study information competitors who seek to take the initiative and the strategic message away from NATO in order to further their own agenda. Through social cyber forensics tools, e.g., Maltego, we extract metadata associated with propaganda-riddled websites. The extracted metadata helps in the collection of social network information (i.e., friends and followers) and communication network information (i.e., network depicting the flow of information such as tweets, retweets, mentions, and hyperlinks). Through computational social network analysis, we identify influential users and powerful groups (or the focal structures) coordinating the cyber propaganda campaigns. The study examines 21 blogs having over 18,000 blog posts dating back to 1997 and over 9000 Twitter users for the period between August 3, 2014, and September 12, 2015. These blogs were identified, crawled, and stored in our database that is accessible through the Blogtrackers tool. Blogtrackers tool further helped us identify the activity patterns of blogs, keyword patterns, and the influence a blog or a blogger has on the community, and analyze the sentiment diffusion in the community.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Trident Juncture: NATO’s Largest Military Exercise since Cold War. The “Fictitious Target” is Russia (GlobalResearch.ca, available at http://bit.ly/294Uo2E)
- 2.
War game whoops! NATO exercises end with hovercraft, Humvees stuck in sand (VIDEO) (RT.com, available at http://bit.ly/298ya0R)
- 3.
YOU WON’T BELIEVE WHAT NATO IS DOING TO PREPARE FOR WORLD WAR 3! (YouTube.com, available at http://bit.ly/29bcH7P)
- 4.
Maltego, available at www.paterva.com/web6/products/maltego.php
- 5.
Paterva (Pty) Ltd. a new train of thought, available at www.paterva.com
- 6.
Scraawl, available at www.scraawl.com
- 7.
ORA NetScenes, available at http://bit.ly/27fuHnv
References
R.Y.K. Lau, Y. Xia, Y. Ye, A probabilistic generative model for mining cybercriminal networks from online social media. IEEE Comput. Intell. Mag. 9(1), 31–43 (2014)
S. Al-khateeb, N. Agarwal, Analyzing flash mobs in cybernetic space and the imminent security threats a collective action based theoretical perspective on emerging sociotechnical behaviors. In 2015 AAAI Spring Symposium Series, March 2015
B. Wright, Social media and the changing role of investigators. Forensic Mag. December, 2012
M. Mulazzani, M. Huber, E. Weippl, Social network forensics: tapping the data pool of social networks, presented at the 8th annual IFIP WG, 2012, vol. 11
D. Povar, V.K. Bhadran, Forensic data carving, in Digital Forensics and Cyber Crime, vol. 53 (Springer, Berlin, Heidelberg, 2011), pp. 137–148
S. Saleem, P. Popov, I. Bagilli, Extended abstract digital forensics model with preservation and protection as umbrella principles, presented at the 18th international conference on knowledge-based and intelligent information & engineering systems—KES2014, Gdynia, Poland, 2014, vol. 35, pp. 812–821
L. Alexander, Open-source information reveals Pro-Kremlin web campaign. (2015). Dostęp: https://globalvoices.org/2015/07/13/open-source-information-reveals-pro-kremlin-web-campaign/ Accessed 25 May 2017
M.A. Smith et al., Analyzing (social media) networks with NodeXL, in Proceedings of the Fourth International Conference on Communities and Technologies, 2009, pp. 255–264
F. Sen, R. Wigand, N. Agarwal, S. Yuce, R. Kasprzyk, Focal structures analysis: Identifying influential sets of individuals in a social network. Soc. Netw. Anal. Min. 6, 1–22 (2016)
N. Agarwal, S. Kumar, H. Liu, M. Woodward, BlogTrackers: a tool for sociologists to track and analyze blogosphere. In ICWSM, March 2009
N. Alherbawi, Z. Shukur, R. Sulaiman, Systematic literature review on data carving in digital forensic, in Procedia Technology, 2013, vol. 11, pp. 86–92
K. Oyeusi, Computer Forensics (London Metropolitan University, London, 2009)
N. Al Mutawa, I. Baggili, A. Marrington, Forensic analysis of social networking applications on mobile devices. Digit. Invest. 9, S24–S33 (2012)
N. Al Mutawa, I. Al Awadhi, I. Baggili, A. Marrington, Forensic artifacts of Facebook’s instant messaging service, presented at the 2011 international conference for internet technology and secured transactions (ICITST), 2011, pp. 771–776
M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, E. Weippl Social snapshots: digital forensics for online social networks, presented at the proceedings of the 27th annual computer security applications conference, ACM, 2011, pp. 113–122
N. Abokhodair, D. Yoo, D.W. McDonald, Dissecting a social botnet: growth, Content and Influence in Twitter, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015, pp. 839–851
S. Al-khateeb, N. Agarwal, Examining Botnet behaviors for propaganda dissemination: a case study of ISIL’s beheading videos-based propaganda, presented at the data mining workshop (ICDMW), 2015 IEEE international conference on, 2015, pp. 51–57
S. Al-khateeb, M. Hussain, N. Agarwal, Exploring ISIL cyber network activities: evolution, means, and strategies, in XXXVI International Sunbelt Social Network Conference, Newport Beach, CA, p. 4
S. Al-khateeb, N. Agarwal, Understanding strategic information Manoeuvres in network media to advance cyber operations: a case study analysing pro-Russian separatists’ cyber information operations in Crimean water crisis. J. Balt. Secur. 2(1), 6–17 (2016)
N. Agarwal, S. Al-khateeb, R. Galeano, R. Goolsby, Examining the use of botnets and their evolution in propaganda dissemination. Def. Strateg. Commun. 2(2), 87–112 (2017)
N. Agarwal, H. Liu, L. Tang, S.Y. Philip, Modeling blogger influence in a community. Soc. Netw. Anal. Min. 2(2), 139–162 (2012)
N. Agarwal, H. Liu, L. Tang, P.S. Yu, Identifying the influential bloggers in a community, in Proceedings of the 2008 International Conference on Web Search and Data Mining, 2008, pp. 207–218
S. Kumar, R. Zafarani, M.A. Abbasi, G. Barbier, H. Liu, Convergence of influential bloggers for topic discovery in the blogosphere, in Advances in Social Computing, 2010, pp. 406–412
A. Java, P. Kolari, T. Finin, T. Oates, “Modeling the spread of influence on the blogosphere,” in Proceedings of the 15th International World Wide Web Conference, 2006, pp. 22–26
K.E. Gill, How can we measure the influence of the blogosphere, in WWW 2004 Workshop on the Weblogging Ecosystem: Aggregation, Analysis and Dynamics, 2004
M. Bazzell, Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 4th edn (CCI Publishing, 2014)
B. Etling, J. Kelly, R. Faris, J. Palfrey, Mapping the Arabic blogosphere: politics, culture, and dissent, in Media Evolution on the Eve of the Arab Spring, ed. by L. Hudson, A. Iskandar, M. Kirk (Palgrave Macmillan, New York, 2014), pp. 49–74
R.B. Standler, Propaganda and How to Recognize it, RBS0, 02-Sep-2005
Acknowledgements
This research is funded in part by the U.S. National Science Foundation (IS-1636933, IIS-1110868 and ACI-1429160), U.S. Office of Naval Research (N000141010091, N000141410489, N0001415P1187, N000141612016, N000141612412, N00014-17-1-2605, and N00014-17-1-2675), U.S. Air Force Research Lab, U.S. Army Research Office (W911NF-16-1-0189), U.S. Defense Advanced Research Projects Agency (W31P4Q-17-C-0059), and the Jerry L. Maulden/Entergy Fund at the University of Arkansas at Little Rock. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding organizations. The researchers gratefully acknowledge the support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Al-Khateeb, S., Hussain, M.N., Agarwal, N. (2019). Leveraging Social Network Analysis and Cyber Forensics Approaches to Study Cyber Propaganda Campaigns. In: Özyer, T., Bakshi, S., Alhajj, R. (eds) Social Networks and Surveillance for Society. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-78256-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-78256-0_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78255-3
Online ISBN: 978-3-319-78256-0
eBook Packages: Social SciencesSocial Sciences (R0)