$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Understanding Strategic Information Manoeuvres in Network Media to Advance Cyber Operations: A Case Study Analysing Pro-Russian Separatists’ Cyber Information Operations in Crimean Water Crisis 원문보기

Journal on baltic security, v.2 no.1, 2016년, pp.6 - 27  

Al-Khateeb, Samer (Maulden-Entergy Chair Professor of Information Science University of Arkansas at Little Rock, United States of America) ,  Agarwal, Nitin (Maulden-Entergy Chair Professor of Information Science University of Arkansas at Little Rock, United States of America)

Abstract

AbstractThe inexpensive nature and wide availability of emerging media outlets, e.g. social networking sites and blogs makes them easy-to-use weapons, giving power and courage to individuals to form groups that are able to win or at least force concessions from stronger forces. Today, terrorist groups know that opinions can be influenced using networked media and this knowledge empowers and enables them to alienate their audience and sometimes provoke them into violent actions. To understand the strategic information manoeuvres used by such groups, e.g., trans-national terrorist groups, we study the channels (blogs, Twitter, etc.) and methods (e.g., influential actors/groups) they use to disseminate messages pertaining to recruitment, radicalization, and raising funds. We collect data from several sources, including over 130 blog websites known for pro-Russian propaganda for events such as the Crimean water crisis and Trident Juncture Exercise (TRJE 15). In addition to blogs, we collect data from Twitter for the above-mentioned events to study the crossinfluence of various social media platforms in conducting strategic information manoeuvres. The study shows that groups are able to spread their opinions and create emotional attitudes for their followers through the sophisticated and blended use of these network media platforms via powerful actors, trolls, and botnets. We design social and network science informed methodologies to study the sociotechnical behaviours of trolls and botnets and develop detection tools ready to be deployed for Cyber operations. The tools have been further tested in the information operations of ISIL, e.g., beheading of hostages in orange jump suits. This study helps identifying the actions needed to win this “battle of ideas”.

참고문헌 (22)

  1. 10.1145/2675133.2675208 Abokhodair, N., Yoo, D., McDonald, D.W., 2015. Dissecting a Social Botnet: Growth, Content and Influence in Twitter, in: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM. 

  2. Allen, M., 2014. Kremlin’s “social media takeover”: Cold War tactics fuel Ukraine crisis [WWW Document]. Democr. Dig. Natl. Endow. Democr. URL http://www.demdigest.net/blog/kremlins-social-mediatakeover-cold-war-tactics-fuel-ukraine-crisis/ (accessed 5.27.15). 

  3. BBC, N., 2014. Russia fears Crimea water shortage as supply drops [WWW Document]. BBC News. URL http://www.bbc.com/news/world-europe-27155885 (accessed 5.27.14). 

  4. Berger, J.M., 2015. How ISIS Succeeds on Social Media Where #StopKony Fails [WWW Document]. The Atlantic. URL http://www.theatlantic.com/international/archive/2015/03/how-isis-succeeds-where-stopkony-fails/387859/ (accessed 5.27.15). 

  5. Berger, J.M., 2014. How ISIS Games Twitter: The militant group that conquered northern Iraq is deploying a sophisticated socialmedia strategy [WWW Document]. The Atlantic. URL http://www.theatlantic.com/international/archive/2014/06/isis-iraq-twitter-social-media-strategy/372856/ (accessed 5.27.15). 

  6. Bohlen, C., 2014. Cold War Media Tactics Fuel Ukraine Crisis [WWW Document]. The Times. URL http://www.nytimes.com/2014/03/11/world/europe/cold-warmedia-tactics-fuel-ukraine-crisis.html (accessed 5.27.15). 

  7. Boshmaf, Y., Muslukhov, I., Beznosov, K., Ripeanu, M., 2012. Key challenges in defending against malicious socialbots, in: Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats. USENIX Association. 

  8. Carter, J.A., Maher, S., Neumann, P.R., 2014. #Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks. The International Center for the Study of Radicalization and Political Violence (ICSR). 

  9. Dye, J., Finkle, J., 2013. US Charges Eight in $45 Million Cybercrime Scheme [WWW Document]. CNBC. URL http://www.cnbc.com/id/100724220#. (accessed 5.6.15). 

  10. 10.1145/2187836.2187846 Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P., 2012. Understanding and combating link farming in the twitter social network, in: Proceedings of the 21st International Conference on World Wide Web. ACM. 

  11. 10.1073/pnas.122653799 Girvan, M., Newman, M.E.J., 2002. Community structure in social and biological networks. Proc. Natl. Acad. Sci. U. S. Am. 99. doi:10.1073/pnas.122653799 

  12. Hall, J., 2014. “U dont need much, u get wages here, u get food provided and place to stay”: The rough travel guide British ISIS fighters are using to lure fellow Britons in to waging Jihad in Iraq. [WWW Document]. Dly. Mail. URL http://www.dailymail.co.uk/news/article-2661177/Travel-lightleave-Islamic-books-home-dont-arouse-suspicion-Isis-militantsoffer-travel-advice-jihadists-arriving-Syria-Iraq-Britain.html (accessed 5.27.15). 

  13. Hoke, Z., Babb, C., 2015. FBI Investigating Cyber Attack on US Central Command. Voice Am. URL http://www.voanews.com/content/us-centcom-twitter-hackedapparently-by-is-group/2595139.html (accessed 5.6.15). 

  14. Karasaridis, A., Rexroad, B., Hoeflin, D., 2007. Wide-scale botnet detection and characterization, in: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets. Cambridge, MA. 

  15. Kumar, S., Barbier, G., Abbasi, M.A., Liu, H., 2011. TweetTracker: An Analysis Tool for Humanitarian and Disaster Relief., in: ICWSM. 

  16. 10.1109/ASONAM.2014.6921612 Labatut, V., Dugue, N., Perez, A., 2014. Identifying the Community Roles of Social Capitalists in the Twitter Network. Presented at the IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM), China. doi:10.1109/ASONAM.2014.6921612 

  17. Nissen, T.E., 2015. #TheWeaponizationOfSocialMedia. 

  18. Protalinski, E., 2012. Facebook: 5-6% of accounts are fake [WWW Document]. ZDNet. URL http://www.zdnet.com/article/facebook-5-6-of-accounts-arefake/ (accessed 5.8.15). 

  19. 10.1145/2501654.2501659 Rodriguez-Gomez, R.A., Macia-Fernandez, G., Garcia-Teodoro, P., 2013. Survey and taxonomy of botnet research through lifecycle. ACM Comput. Surv. CSUR 45, 45. 

  20. Sindelar, D., 2014. The Kremlin’s Troll Army [WWW Document]. TheAtlantic. URL http://www.theatlantic.com/international/archive/2014/08/the-kremlins-troll-army/375932/ (accessed 5.6.15). 

  21. 10.1145/1556460.1556497 Smith, M.A., Shneiderman, B., Milic-Frayling, N., Mendes Rodrigues, E., Barash, V., Dunne, C., Capone, T., Perer, A., Gleave, E., 2009. Analyzing (social media) networks with NodeXL, in: Proceedings of the Fourth International Conference on Communities and Technologies. ACM. 

  22. Tatham, S.A., Defence Academy of the United Kingdom, Advanced Research and Assessment Group, 2008. Strategic communication: a primer. Defence Academy of the United Kingdom, Advanced Research and Assessment Group, Shrivenham. 

관련 콘텐츠

오픈액세스(OA) 유형

GOLD

오픈액세스 학술지에 출판된 논문

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로