Biay SocialMediaFromSocial 2017
Biay SocialMediaFromSocial 2017
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Army Cyber Institute is collaborating with JSTOR to digitize, preserve and extend access to The
Cyber Defense Review
INTRODUCTION
W
SOCIAL MEDIA—BEGINNINGS
hen discussing the origins of social media, researchers usually start in
the 1980s and the Bulletin Board Systems (BBS). They were a kind of
online meeting room that allowed users to download games and other
files, and leave messages to co-users. The social aspect of this exchange
was pretty clear, but the interaction was rather limited and slow due to technological
reasons. What is more important, the social interaction had a rather random character—
people did not know who was sitting at the other end of the telephone line.
However, BBS proved a growing interest in this kind of communication and inspired
other platforms to emerge from the early Internet. The big success of sites like Class-
mates.com confirmed the need for a virtual exchange of memories, ideas, and views.
This time, users could enter into social interaction with precisely chosen people, and
create networks of “friends”, based on their common school experience. Classmates.
com has equivalents in countries all over the world. The best example is the webpage
Odnoklasniki (classmates), which is very popular in Russia and other former Soviet,
Russian-speaking countries of Ukraine, Kyrgyzstan, Uzbekistan, and Georgia.
The second half of the 1990s has numerous examples of emerging platforms built on
a similar principle, for example, SixDegrees.com (founded in 1997). But the real social
network revolution started at the beginning of the 2000s when the Friendster website
was launched. After just one year it had gathered a community of three million users
(the first site with such a big audience). “Participatory culture” became a buzzword,
enhanced by dynamic technological development. Different platforms were founded,
using different “sociality” models. A particularly interesting example is Linked-In (2003)
which is a platform for professional networking, where one’s contacts were not friends
|
70 THE CYBER DEFENSE REVIEW
Over time, social media platforms have become huge pools of data for advertising
and marketing companies. Within the last three years, Facebook alone noted a 120%
increase of brands placing paid promotion on the platform. Social media companies
have also developed e-commerce features, allowing their users to shop directly from the
social media website, following the example and advice of social network “friends”. [10]
Social and commercial activities have become two powerful drivers of social media
platform development.
|
SUMMER 2017 71
When it comes to data, it is worth dedicating a few lines to the concepts of Big Data
and social media mining. As the authors of the book “Social Media Mining” state, “social
media data is undoubtedly big,” [11] which is only one of many challenges that must be faced
by those who want to explore it. The others are the unstructured character of data, its nois-
iness, and social relations hidden there with friends, connections, following—followers.
These particular characteristics call for data analysis methods, which can encompass
an understanding of user-generated content, including a wide range of social relations.
This technique, termed social media mining, draws on the different disciplines of com-
puter science, machine learning, social network analysis, statistics, sociology, and many
others, as well as interdisciplinary concepts and theories.
Social media mining “searches for hidden patterns and relationships correlations, in
addition to interdependencies that exist within large databases that the traditional infor-
mation gathering methods (…) may fail to notice”. [11] It aims at discovering the relations
between “social atoms” (individual users),
Social media mining, “social entities” (content, sites, networks),
and interactions between the two previous
draws on the different categories. [13] It helps to identify communit-
disciplines of computer ies on a social network and determine who
the most important people are in a social
science, machine learning, network (the influencers).
social network analysis, Such analysis is useful for marketing pur-
poses, by targeting users who are likely
statistics, sociology, and to effectively disseminate brand awareness
many others. and increase the reach of potential custom-
ers. In a similar way, social media mining
can be used by other actors, who aim to build advocacy for their narrative. Some experts’
claim that it is useful for predicting future behavior of given groups (e.g. terrorists),
based on a special algorithm. [14] In any case, Big Data and social media mining are two
emerging concepts with a breathtaking future.
|
72 THE CYBER DEFENSE REVIEW
Obviously, there can be various motivations for using social networks. In April 2015,
Global Web Index published a report presenting the reasons why people use social media
(see the next chart). Among the top ten, reason number one is clearly “social”—“to stay
in touch with what my friends are doing”. There are also other responses on the list, like
sharing one’s opinion or details of one’s private life, sharing pictures or videos, networking
with people, meeting new people, and being there “because a lot of my friends are on it”—
all of these show high social motivation. But it is worth noting number two on the list—
“to stay up-to-date with news and current events”, which has nothing to do with the social
character of “social networking services” (as it was stated in the survey question). Looking
for information, not necessarily about friends, but for information in general, has been a
growing trend among social media users. Social networks are more and more considered
a source of content, although this content is generated by the users themselves.
|
SUMMER 2017 73
HARDLY
EVER
18%
Figure 2. Source: Survey conducted January 12- February 8, 2016. "News Use Across
Social Media Platforms 2016" Pew Research Center
This trend was also observed by researchers from SWOCC (research organization linked
to the department of communication studies at the University of Amsterdam). Their study,
carried out in 2016, showed that users’ perceptions of social media had changed consid-
erably. Some platforms are perceived as being less “social”, and more “informative” (e.g.
Twitter). Other research from 2016, conducted by Pew Research Center, concludes that
62% of US adults are getting their news from social media. The growing trend seems
obvious, in 2012, this number was 49%.
Although it would be risky to say that social media platforms have become a direct
competitor to mainstream media, their role in the flow of information is prominent. What
is more, they have become a source of content for traditional media. Information agencies
and journalists establish their Twitter or Facebook accounts not only to disseminate their
message but also to hunt for news posted by other social media users. In such a way,
information generated by a “grassroots journalist” [15] can obtain an unexpectedly large
reach. This can become problematic if the news appears to be inaccurate or simply fake.
An excellent example of such misinformation is the “Senator Cirenga case”; a sensational
post on the Facebook account of a non-existent Italian senator, which was used and covered
by several newspapers, and turned out to be untrue. [16]
The above-mentioned example shows how challenging and risky it is for an Internet
user to consider social media a source of information. Easy access, the possibility of
anonymity, and no gatekeepers are a dangerous mix. In traditional media, journalists
are supposed to observe the rules of the profession, and editors check if an article
meets the standards of accuracy, and reliability, then decide if it can be published.
On social media, anybody can become a ‘journalist’ and, anything can become ‘news’.
|
74 THE CYBER DEFENSE REVIEW
Order and Discourse Discussion Expansion Special Point of View Chaotic Mass Behavior
Mass Protests
The recent conflicts in the Middle East and Ukraine demonstrated that social media
could be a very useful means to support military operations. Since then, it has been
exploited to such an extent that it seems justifiable to call social media an information
confrontation battlefield. Obviously, there are many different ways of using social media
SUMMER 2017 75 |
for supporting military objectives. Tomas Elkjer Nissen identifies six of them: intelligence
collection, (geo-) targeting, cyber operations, command and control, defense, and psycho-
logical warfare (inform and influence). [19]
QShape
Weaponization of Social Media QInform
by Thomas Elkjer Nissen QInfluence
QManipulate
QMislead
Targeting QExpose
QDiminish
QPromote
QDeceive
QMonitor Intelligence Inform and QCoerce
QCollect Collection Influence QDeter
QExploit Weaponization QMobilize
of Social Media QConvince
(activities and effects)
QDetect QDeny
QPrevent Defence Operations QDisrupt
QSecure QDegrade
QProtect QBreach
QFacilitate Command and QDestroy
QCoordinate Control
QSynchronise
Figure 4. Source: Social Media as a Toll of Hybrid Warfare, NATO Strategic Communications Centre
of Excellence, Riga, July 2016, p. 11
|
76 THE CYBER DEFENSE REVIEW
Command and Control (C2)—using social media platforms for internal communication
and coordination. Depending on their objectives, different actors can use more or less
open networks to synchronize their operations. An especially interesting example is the
PlayStation game network used by Daesh for coordination of its actions. [22] Obviously,
different social media platforms represent varying levels of security. For this reason,
actors like terrorist organizations often choose closed networks for their communication.
For example, Daesh uses the adaptive structure of its network to defend it against possible
infiltration or external influence.
Psychological warfare (inform and influence)—using social media as the channel for
disseminating messages whose objective is to influence (change) target audiences’ opin-
ions, beliefs, perceptions, and behaviors. It means achieving some military effect in the
cognitive domain using misinformation (including disinformation) and propaganda.
Without minimizing the importance of the first five above mentioned hostile activities,
we will examine closely the last one—psychological warfare on social media.
|
78 THE CYBER DEFENSE REVIEW
|
SUMMER 2017 79
|
80 THE CYBER DEFENSE REVIEW
|
SUMMER 2017 81
Although Ben Nimmo assigned the 4D Approach specifically to Russia, these tactics
are also used by other actors, and social media is a very convenient platform for their
application. Internet users who more and more frequently consider social media as their
main source of information are an attractive target for those who do not hesitate to manipu-
late or falsify facts and present their version of reality, supporting their particular agenda.
To increase effectiveness, they use a variety of techniques and methods, examined below.
|
82 THE CYBER DEFENSE REVIEW
a new app was developed to teach the alphabet to children, but one can find a large number
of references to weapons and jihad. [34]
Another technique used to increase the exposure of
a given narrative on social media is trolling. However, it The most striking
is important to note the fundamental difference between
a “classic” internet troll and a “hybrid” troll. The first characteristics of
category has been present in digital media from the very
beginning and designates a particular kind of social
social media is
media user who, for purely personal reasons (frustra- the high speed of
tion, unhappy life, and psychological problems), tries to
disrupt social network conversation by offending other
information flow
users, provoking, and posting unpleasant comments or combined with
comments out of context. The other one is a kind of social
media warrior, hired by a state or a non-state organization unlimited range,
for supporting this organization’s cause and executing cost-efficiency
its agenda. [35] These “information spetsnazes”, as they are
called by one of the eminent Russian theorists of infor- and availability.
mation warfare, Igor Panarin [36], are tasked to post comments to either promote the nar-
rative of their patron or to destroy the narrative of his opponents. They overwhelm social
media with a huge volume of posts, using different manipulative techniques and methods
which have enabled researchers to discern a couple of interesting categories of hybrid
trolls: “bikini troll”, “Wikipedia troll”, “aggressive troll”, “attachment troll”, and “conspir-
acy troll” (also called “blame the US troll”). [37] The good news is that social media users
are not defenseless against hybrid trolls, and a minimum level of awareness and practice
can help to detect and expose them. In one of its reports, the NATO Strategic Commu-
nications Centre of Excellence published an “Internet Trolling Identification Tutorial” [38]
presenting a four-step approach which can help in countering hybrid trolls’ activity.
Trolling (especially “attachment trolls”) can also be used for conducting cyber
operations, such as intelligence collection. The Latvian Information Technology Security
Incident Response Institution (CERT) discovered that pro-Russian trolls were using the
comments sections of Latvian web portals to disseminate propaganda and encourage
other users to click on web links containing spying malware. [39]
An effective method of increasing the impact of a narrative or specific messages is
the coordinated use of multiple channels—open and closed. The communication goes
through public conversation platforms, such as Twitter, and within closed networks, such
as encrypted messengers or—as it was mentioned earlier—even via PlayStation Network
which is extremely challenging for decryption, and more difficult to track than WhatsApp.
Documents leaked by Edward Snowden in 2013 revealed that the NSA and CIA attempted
|
SUMMER 2017 83
to infiltrate terrorist conversations by taking part in games like World of Warcraft. [40]
Public networks are mainly used for spreading propaganda or misinformation, while
closed social networks may be an efficacious channel for coordination of activities (C2),
recruitment and the mobilization of support.
An interesting mutation of the above-mentioned technique is the Kremlin’s cross-
media communication approach broadly used in the Ukrainian conflict. The idea con-
sists of feeding the mainstream media with information, mostly fake, posted on social
media or—vice-versa—disseminating materials made by pro-Kremlin media (e.g. TV chan-
nels controlled by Kremlin or pro-Kremlin websites) via social media conversations.
A striking example of this method is the case of “Doctor from Odessa”, an alleged emer-
gency physician who described on his Facebook account a dramatic story of his fight
to save wounded civilians. In the post, the “Doctor from Odessa” he depicted, in a very
emotional way, the cruelty of pro-Ukrainian extremists who stopped him from tending
to his patients. Although bloggers investigating the “Doctor’s” case discovered that such
a person did not exist, and the Facebook account was blocked, the story immediately
became very popular and was covered by the media. [41]
For spreading a given message even further, the cross-media communication approach
can also be combined with other techniques, such as the use of botnets. And last, but not
least, it has become a general rule to integrate pro-Kremlin online media: Russia Today,
and Sputnik with social media (Twitter, etc.).
Newsletter 11%
Magazine 2%
Figure 11. Source: NATO StratCom COE report The DAESH Strategic
Narrative, June 2016
|
84 THE CYBER DEFENSE REVIEW
|
SUMMER 2017 85
|
86 THE CYBER DEFENSE REVIEW
The challenge is enormous, but the future is not lost. Observation of the social media
environment and the activities of “bad actors” enable us to formulate a few key recommen-
dations.
Be present on social media with attractive, well-tailored content. It is a vital part
of the information environment, and it should be considered as an obvious element of
communication campaigns. Instead of choosing platforms, it is wiser to choose target
audiences, and to follow them—they have already chosen their platforms.
Use what technology offers. Our adversaries use it effectively, creating attractive con-
tent and disseminating it via multiple channels. “Think mobile” is not just a catchy slogan.
Neither is “cross-media activity”. But do not forget that “social media is about sociology
and psychology more than technology” [44].
Advance your own narrative and develop attractive branding. A well prepared off-
ense is usually a more certain path to victory than defense. When promoting your narrative,
be consistent and credible.
Build your brand and narrative advocacy. Find credible voices within the target
audiences that can speak for you. Humanitarian organizations’ experience with crowd-
sourcing can serve as a very useful model.
Immunize your audience against psychological operations. It is vital to raise citizens’
awareness of the influence activities used by our adversaries. There are two main lines
of defense: education and exposure of hostile activities. Education gives citizens (starting
from relatively young age) basic knowledge about media and social media that helps
build critical thinking and fact-checking habits. Exposure of hostile activities requires
tracking online deception, manipulation and disinformation, and neutralizing it with
the truth. Because however lofty it may sound, truth is a powerful weapon.
|
SUMMER 2017 87
NOTES
1. http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/.
2. http://www.digitaltrends.com/features/the-history-of-social-networking/.
3. https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/.
4. https://www.brandwatch.com/blog/44-twitter-stats-2016/.
5. Ibidem.
6. Report New Trends in Social Media, NATO Strategic Communications Centre of Excellence, Riga, December 2016, 13.
All reports of NATO StratCom COE can be found here: http://www.stratcomcoe.org/publications.
7. Ibidem, 13.
8. Special Report: Digital in 2016, http://wearesocial.com/uk/special-reports/digital-in-2016.
9. http://www.pewinternet.org/2016/11/11/social-media-update-2016/.
10. Report New Trends in Social Media, NATO Strategic Communications Centre of Excellence, Riga, December 2016, 9.
11. Reza Zafarani, Mohammad Ali Abbasi, Huan Liu, Social Media Mining, Cambridge University Press, April 20, 2014,
http://dmml.asu.edu/smm/SMM.pdf.
12. Daniel Armstrong, Exploring Social Media’s Influence during Conflict and Crisis, Grounded Curiosity, November 2016,
http://groundedcuriosity.com/exploring-social-medias-influence-during-conflict-and-crisis/#_ftn37.
13. Reza Zafarani, Mohammad Ali Abbasi, Huan Liu, Op. Cit.
14. Catherine Caruso, Can a Social-Media Algorithm Predict a Terror Attack, MIT Technology Review, June 16, 2016, https://
www.technologyreview.com/s/601700/can-a-social-media-algorithm-predict-a-terror-attack/.
15. The concept of grassroots journalism was exquisitely developed by Dan Gillmor in his book We the Media, grassroots jour-
nalism by the people, for the people, O’Reilly Media, Inc., 2004.
16. https://www.weforum.org/agenda/2016/01/q-a-walter-quattrociocchi-digital-wildfires?utm_content=buffer-
259d4&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer.
17. https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users/.
18. Rebecca Goolsby, On Cybersecurity, Crowdsourcing, and Social Cyber-Attack, http://www.stratcomcoe.org/rebecca-gools-
by-cybersecurity-crowdsourcing-and-social-cyber-attack.
19. Report Social Media as a Toll of Hybrid Warfare, NATO Strategic Communications Centre of Excellence, Riga, July 2016,
13.
20. Report Network of Terror: How DAESH uses adaptive social networks to spread its message, NATO Strategic Communications
Centre of Excellence, Riga, December 2015, 9.
21. http://www.theverge.com/2013/4/23/4257392/ap-twitter-hacked-claims-explosions-white-house-president-injured.
22. Report Social Media as a Toll of Hybrid Warfare, NATO Strategic Communications Centre of Excellence, Riga, July 2016,
17.
23. Report Network of Terror: How DAESH uses adaptive social networks to spread its message, NATO Strategic Communications
Centre of Excellence, Riga, December 2015, 21.
24. Report New Trends in Social Media, NATO Strategic Communications Centre of Excellence, Riga, December 2016, 32-33.
25. Report Internet Trolling as a Tool of Hybrid Warfare: The Case of Latvia, NATO Strategic Communications Centre of Excel-
lence, Riga, January 2016, 10.
26. AJP – 3.10.1, Allied Joint Doctrine for Psychological Operations, 2014, section IV – Principles of PsyOps.
27. Ibidem, section III - PSYOPS within strategic communications and information operations.
28. Jolanta Darczewska, The Anatomy of Russian Information Warfare, the Crimea Operation – a Case Study, Point of
View, Centre for Eastern Studies, Warsaw, May 2014, 11-12, http://www.osw.waw.pl/sites/default/files/the_anatomy_of_
russian_information_warfare.pdf.
29. http://www.stopfake.org/en/anatomy-of-an-info-war-how-russia-s-propaganda-machine-works-and-how-to-
counter-it/.
|
88 THE CYBER DEFENSE REVIEW
NOTES
30. You can watch one of these propaganda films here: https://www.youtube.com/watch?v=hiY7JFadLm8.
31. Twitter Has Stopped Updating Its Public Tally Of Bots, William Alden, BuzzFeed, November 10, 2015, https://www.buzz-
feed.com/williamalden/twitter-has-stopped-updating-its-public-tally-of-bots?utm_term=.qy111VP6D#.pbYRR3mJZ.
32. Facebook estimates that between 5.5% and 11.2% of accounts are fake, Emil Protalinski, The Next Web, http://thenextweb.
com/facebook/2014/02/03/facebook-estimates-5-5-11-2-accounts-fake/.
33. Report Social Media as a Tool of Hybrid Warfare, NATO Strategic Communications Centre of Excellence, Riga, July 2016,
37.
34. Report New Trends in Social Media, NATO Strategic Communications Centre of Excellence, Riga, December 2016, 34.
35. Report Internet Trolling as a Tool of Hybrid Warfare: The Case of Latvia, NATO Strategic Communications Centre of Excel-
lence, Riga, January 2016, 10.
36. Jolanta Darczewska, The Anatomy of Russian Information Warfare, the Crimea Operation – a Case Study, Point of View, Cen-
tre for Eastern Studies, Warsaw, May 2014, 16, http://www.osw.waw.pl/sites/default/files/the_anatomy_of_russian_infor-
mation_warfare.pdf.
37. For more information see the Report Internet Trolling as a Tool of Hybrid Warfare: The Case of Latvia, NATO Strategic
Communications Centre of Excellence, Riga, January 2016.
38. Report Internet Trolling as a Tool of Hybrid Warfare: The Case of Latvia, NATO Strategic Communications Centre of Excel-
lence, Riga, January 2016, 42.
39. Report Social Media as a Tool of Hybrid Warfare, Strategic Communications Centre of Excellence, Riga, July 2016, 31.
40. Appropriate fragments of the leaked documents can be found here: http://gawker.com/nsa-and-cia-spied-on-world-
of-warcraft-other-online-vi-1479458437.
41. Report Analysis of Russia’s Information Campaign against Ukraine, NATO Strategic Communications Centre of Excellence,
Riga, July 2015, 23.
42. Report New Trends in Social Media, NATO Strategic Communications Centre of Excellence, Riga, December 2016, 23.
43. Report Daesh Recruitment, How the Group Attracts Supporters, NATO Strategic Communications Centre of Excellence,
Riga, November 2016, 23-24.
44. Brian Solis’ quotation used in the article by Nicole Matejic 3 things Anthony Robbins reminded me about communication:
http://www.infoopshq.com/2016/10/02/3-things-anthony-robbins-reminded-me-about-communication/.
SUMMER 2017 89 |