The inexpensive nature and wide availability of emerging media outlets, e.g. social networking sites and blogs makes them easy-to-use weapons, giving power and courage to individuals to form groups that are able to win or at least force concessions from stronger forces. Today, terrorist groups know that opinions can be influenced using networked media and this knowledge empowers and enables them to alienate their audience and sometimes provoke them into violent actions. To understand the strategic information manoeuvres used by such groups, e.g., trans-national terrorist groups, we study the channels (blogs, Twitter, etc.) and methods (e.g., influential actors/groups) they use to disseminate messages pertaining to recruitment, radicalization, and raising funds. We collect data from several sources, including over 130 blog websites known for pro-Russian propaganda for events such as the Crimean water crisis and Trident Juncture Exercise (TRJE 15). In addition to blogs, we collect data from Twitter for the above-mentioned events to study the crossinfluence of various social media platforms in conducting strategic information manoeuvres. The study shows that groups are able to spread their opinions and create emotional attitudes for their followers through the sophisticated and blended use of these network media platforms via powerful actors, trolls, and botnets. We design social and network science informed methodologies to study the sociotechnical behaviours of trolls and botnets and develop detection tools ready to be deployed for Cyber operations. The tools have been further tested in the information operations of ISIL, e.g., beheading of hostages in orange jump suits. This study helps identifying the actions needed to win this “battle of ideas”.
If the inline PDF is not rendering correctly, you can download the PDF file here.
Abokhodair N. Yoo D. McDonald D.W. 2015. Dissecting a Social Botnet: Growth Content and Influence in Twitter in: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM.
Allen M. 2014. Kremlin’s “social media takeover”: Cold War tactics fuel Ukraine crisis [WWW Document]. Democr. Dig. Natl. Endow. Democr. URL http://www.demdigest.net/blog/kremlins-social-mediatakeover-cold-war-tactics-fuel-ukraine-crisis/ (accessed 5.27.15).
BBC N. 2014. Russia fears Crimea water shortage as supply drops [WWW Document]. BBC News. URL http://www.bbc.com/news/world-europe-27155885 (accessed 5.27.14).
Berger J.M. 2015. How ISIS Succeeds on Social Media Where #StopKony Fails [WWW Document]. The Atlantic. URL http://www.theatlantic.com/international/archive/2015/03/how-isis-succeeds-where-stopkony-fails/387859/ (accessed 5.27.15).
Berger J.M. 2014. How ISIS Games Twitter: The militant group that conquered northern Iraq is deploying a sophisticated socialmedia strategy [WWW Document]. The Atlantic. URL http://www.theatlantic.com/international/archive/2014/06/isis-iraq-twitter-social-media-strategy/372856/ (accessed 5.27.15).
Bohlen C. 2014. Cold War Media Tactics Fuel Ukraine Crisis [WWW Document]. The Times. URL http://www.nytimes.com/2014/03/11/world/europe/cold-warmedia-tactics-fuel-ukraine-crisis.html (accessed 5.27.15).
Boshmaf Y. Muslukhov I. Beznosov K. Ripeanu M. 2012. Key challenges in defending against malicious socialbots in: Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats. USENIX Association.
Carter J.A. Maher S. Neumann P.R. 2014. #Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks. The International Center for the Study of Radicalization and Political Violence (ICSR).
Dye J. Finkle J. 2013. US Charges Eight in $45 Million Cybercrime Scheme [WWW Document]. CNBC. URL http://www.cnbc.com/id/100724220#. (accessed 5.6.15).
Ghosh S. Viswanath B. Kooti F. Sharma N.K. Korlam G. Benevenuto F. Ganguly N. Gummadi K.P. 2012. Understanding and combating link farming in the twitter social network in: Proceedings of the 21st International Conference on World Wide Web. ACM.
Girvan M. Newman M.E.J. 2002. Community structure in social and biological networks. Proc. Natl. Acad. Sci. U. S. Am. 99. doi:
Hall J. 2014. “U dont need much u get wages here u get food provided and place to stay”: The rough travel guide British ISIS fighters are using to lure fellow Britons in to waging Jihad in Iraq. [WWW Document]. Dly. Mail. URL http://www.dailymail.co.uk/news/article-2661177/Travel-lightleave-Islamic-books-home-dont-arouse-suspicion-Isis-militantsoffer-travel-advice-jihadists-arriving-Syria-Iraq-Britain.html (accessed 5.27.15).
Hoke Z. Babb C. 2015. FBI Investigating Cyber Attack on US Central Command. Voice Am. URL http://www.voanews.com/content/us-centcom-twitter-hackedapparently-by-is-group/2595139.html (accessed 5.6.15).
Karasaridis A. Rexroad B. Hoeflin D. 2007. Wide-scale botnet detection and characterization in: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets. Cambridge MA.
Kumar S. Barbier G. Abbasi M.A. Liu H. 2011. TweetTracker: An Analysis Tool for Humanitarian and Disaster Relief. in: ICWSM.
Labatut V. Dugue N. Perez A. 2014. Identifying the Community Roles of Social Capitalists in the Twitter Network. Presented at the IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM) China. doi:
Labatut, V., Dugue, N., Perez, A., 2014. Identifying the Community Roles of Social Capitalists in the Twitter Network. Presented at the IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM), China. doi:10.1109/ASONAM.2014.6921612)| false
Protalinski E. 2012. Facebook: 5-6% of accounts are fake [WWW Document]. ZDNet. URL http://www.zdnet.com/article/facebook-5-6-of-accounts-arefake/ (accessed 5.8.15).
Rodríguez-Gómez R.A. Maciá-Fernández G. García-Teodoro P. 2013. Survey and taxonomy of botnet research through lifecycle. ACM Comput. Surv. CSUR 45 45.
Sindelar D. 2014. The Kremlin’s Troll Army [WWW Document]. TheAtlantic. URL http://www.theatlantic.com/international/archive/2014/08/the-kremlins-troll-army/375932/ (accessed 5.6.15).
Smith M.A. Shneiderman B. Milic-Frayling N. Mendes Rodrigues E. Barash V. Dunne C. Capone T. Perer A. Gleave E. 2009. Analyzing (social media) networks with NodeXL in: Proceedings of the Fourth International Conference on Communities and Technologies. ACM.
Tatham S.A. Defence Academy of the United Kingdom Advanced Research and Assessment Group 2008. Strategic communication: a primer. Defence Academy of the United Kingdom Advanced Research and Assessment Group Shrivenham.