Skip to main content

Characterization and Comparison of Russian and Chinese Disinformation Campaigns

  • Chapter
  • First Online:
Disinformation, Misinformation, and Fake News in Social Media

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

While substantial research has focused on social bot classification, less computational effort has focused on repeatable bot characterization. Binary classification into “bot” or “not bot” is just the first step in social cybersecurity workflows. Characterizing the malicious actors is the next step. To that end, this paper will characterize data associated with state sponsored manipulation by Russia and the People’s Republic of China. The data studied here was associated with information manipulation by state actors, the accounts were suspended by Twitter and subsequently all associated data was released to the public. Of the multiple data sets that Twitter released, we will focus on the data associated with the Russian Internet Research Agency and the People’s Republic of China. The goal of this paper is to compare and contrast these two important data sets while simultaneously developing repeatable workflows to characterize information operations for social cybersecurity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alvarez, P., Hosking, T.: The full text of Mueller’s indictment of 13 Russians’. The Atlantic, 16th Feb (2018)

    Google Scholar 

  2. Badawy, A., Addawood, A., Lerman, K., Ferrara, E.: Characterizing the 2016 Russian IRA influence campaign. Soc. Netw. Anal. Min. 9(1), 31 (2019)

    Article  Google Scholar 

  3. Beskow, D., Carley, K.M.: Bot conversations are different: leveraging network metrics for bot detection in twitter. In: Advances in Social Networks Analysis and Mining (ASONAM), 2018 International Conference on, pp. 176–183. IEEE (2018)

    Google Scholar 

  4. Beskow, D., Carley, K.M.: Introducing bothunter: a tiered approach to detection and characterizing automated activity on twitter. In: Bisgin, H., Hyder, A., Dancy, C., Thomson, R. (eds.) International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation. Springer (2018)

    Google Scholar 

  5. Beskow, D.M., Carley, K.M.: Army must regain initiative in social cyberwar. Army Mag. 69(8), 24–28 (2019)

    Google Scholar 

  6. Beskow, D.M., Carley, K.M.: Social cybersecurity: an emerging national security requirement. Mil. Rev. 99(2), 117 (2019)

    Google Scholar 

  7. Bowles, N.: The mainstreaming of political memes online. New York Times (Feb 2018). https://www.nytimes.com/interactive/2018/02/09/technology/political-memes-go-mainstream.html

  8. Chavoshi, N., Hamooni, H., Mueen, A.: Debot: twitter bot detection via warped correlation. In: ICDM, pp. 817–822 (2016)

    Google Scholar 

  9. Chen, A.: The agency. N. Y. Times 2(6), 2015 (2015)

    Google Scholar 

  10. Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: a system to evaluate social bots. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 273–274. International World Wide Web Conferences Steering Committee (2016)

    Google Scholar 

  11. Dawkins, R.: The Selfish Gene: With a New Introduction by the Author. Oxford University Press, Oxford (2006). (Originally published in 1976)

    Google Scholar 

  12. DiResta, R., Shaffer, K., Ruppel, B., Sullivan, D., Matney, R., Fox, R., Albright, J., Johnson, B.: The Tactics & Tropes of the Internet Research Agency. New Knowledge, New York (2018)

    Google Scholar 

  13. Faris, R., Villeneuve, N.: Measuring global internet filtering. In: Access Denied: The Practice and Policy of Global Internet Filtering, vol. 5. MIT Press, Cambridge (2008)

    Google Scholar 

  14. Howard, P.N., Ganesh, B., Liotsiou, D., Kelly, J., François, C.: The IRA, Social Media and Political Polarization in the United States, 2012–2018. University of Oxford, Oxford (2018)

    Google Scholar 

  15. McDonell, S.: Why China censors banned Winnie the pooh – BBC news. https://www.bbc.com/news/blogs-china-blog-40627855 (July 2017). Accessed 29 Sep 2019

  16. Mueller, R.S.: Report on the Investigation into Russian Interference in the 2016 Presidential Election. US Department of Justice, Washington (2019)

    Google Scholar 

  17. Nimmo, B., Brookie, G., Karan, K.: #trolltracker: twitter troll farm archives – DFRLAB – medium. https://file:///Users/dbeskow/Dropbox/CMU/bot_labels/references/ira/%23TrollTracker_%20Twitter%20Troll%20Farm%20Archives%20-%20DFRLab%20-%20Medium.html. Accessed 23 Sep 2019

    Google Scholar 

  18. Safety, T.: Information operations directed at Hong Kong. https://blog.twitter.com/en_us/topics/company/2019/information_operations_directed_at_Hong_Kong.html (August 2019). Accessed 26 Sep 2019

  19. National Academies of Sciences, Engineering, and Medicine: A Decadal Survey of the Social and Behavioral Sciences: A Research Agenda for Advancing Intelligence Analysis. The National Academies Press, Washington (2019). https://doi.org/10.17226/25335, https://www.nap.edu/catalog/25335/a-decadal-survey-of-the-social-and-behavioral-sciences-a

  20. Shifman, L.: The cultural logic of photo-based meme genres. J. Vis. Cult. 13(3), 340–358 (2014)

    Article  Google Scholar 

  21. Shifman, L.: Memes in digital culture. MIT Press, London (2014)

    Google Scholar 

  22. Uren, T., Thomas, E., Wallis, J.: Tweeting Through the Great Firewall: Preliminary Analysis of PRC-linked Information Operations on the Hong Kong Portest. Australia Strategic Policy Institute: International Cyber Policy Center, Barton (2019)

    Google Scholar 

  23. Von Nordheim, G., Boczek, K., Koppers, L.: Sourcing the sources: An analysis of the use of twitter and facebook as a journalistic source over 10 years in the New York times, the guardian, and süddeutsche zeitung. Digit. Journal. 6(7), 807–828 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Office of Naval Research (ONR) Award N00014182106 and Award N000141812108, and the Center for Computational Analysis of Social and Organization Systems (CASOS). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the ONR or the U.S. government.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David M. Beskow .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Beskow, D.M., Carley, K.M. (2020). Characterization and Comparison of Russian and Chinese Disinformation Campaigns. In: Shu, K., Wang, S., Lee, D., Liu, H. (eds) Disinformation, Misinformation, and Fake News in Social Media. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-42699-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-42699-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-42698-9

  • Online ISBN: 978-3-030-42699-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics