Social Cyber Forensics Approach to Study Twitter’s and Blogs’ Influence on Propaganda Campaigns

  • Samer Al-khateebEmail author
  • Muhammad Nihal HussainEmail author
  • Nitin AgarwalEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10354)


In today’s information technology age our political discourse is shrinking to fit our smartphone screens. Online Deviant Groups (ODGs) use social media to coordinate cyber propaganda campaigns to achieve strategic and political goals, influence mass thinking, and steer behaviors. In this research, we study the ODGs who conducted cyber propaganda campaigns against NATO’s Trident Juncture Exercise 2015 (TRJE 2015) and how they used Twitter and blogs to drive the campaigns. Using a blended Social Network Analysis (SNA) and Social Cyber Forensics (SCF) approaches, “anti-NATO” narratives were identified on blogs. The narratives intensified as the TRJE 2015 approached. The most influential narrative identified by the proposed methodology called for civil disobedience and direct actions against TRJE 2015 specifically and NATO in general. We use SCF analysis to extract metadata associated with propaganda-riddled websites. The metadata helps in the collection of social and communication network information. By applying SNA on the data, we identify influential users and powerful groups (or, focal structures) coordinating the propaganda campaigns. Data for this research (including blogs and metadata) is accessible through our in-house developed Blogtrackers tool.


Cyber propaganda campaign Misinformation NATO Trident Juncture Exercise Narrative Influence Blogs Twitter Social media Social Network Analysis Cyber forensics Blogtrackers Social Cyber Forensics 



This research is funded in part by NSF (IIS-1636933, IIS-1110868 and ACI-1429160), ONR (N000141010091, N000141410489, N0001415P1187, N000141612016, and N000141612412), AFRL, ARO (W911NF-16-1-0189), DARPA (W31P4Q-17-C-0059), and the Jerry L. Maulden/Entergy Fund at UA Little Rock.


  1. 1.
    Wright, B.: Social Media and the Changing Role of Investigators, Forensic Mag., December 2012Google Scholar
  2. 2.
    Mulazzani, M., Huber, M., Weippl, E.: Social network forensics: tapping the data pool of social networks. In: Eighth Annual IFIP WG, vol. 11 (2012)Google Scholar
  3. 3.
    Povar, Digambar, Bhadran, V.K.: Forensic data carving. In: Baggili, Ibrahim (ed.) ICDF2C 2010. LNICST, vol. 53, pp. 137–148. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-19513-6_12 CrossRefGoogle Scholar
  4. 4.
    Al-khateeb, S., Agarwal, N.: Analyzing flash mobs in cybernetic space and the imminent security threats a collective action based theoretical perspective on emerging socotechnical behaviors. In: 2015 AAAI Spring Symposium Series (2015)Google Scholar
  5. 5.
    Sen, F., Wigand, R., Agarwal, N., Yuce, S., Kasprzyk, R.: Focal structures analysis: identifying influential sets of individuals in a social network. Soc. Netw. Anal. Min. 6, 1–22 (2016)CrossRefGoogle Scholar
  6. 6.
    Alherbawi, N., Shukur, Z., Sulaiman, R.: Systematic literature review on data carving in digital Forensic. In: Procedia Technology, vol. 11, pp. 86–92 (2013)Google Scholar
  7. 7.
    Oyeusi, K.: Computer Forensics. London Metropolitan University (2009)Google Scholar
  8. 8.
    Agarwal, N., Liu, H., Tang, L., Yu, P.S.: Identifying the influential bloggers in a community. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 207–218 (2008)Google Scholar
  9. 9.
    Alexander, L.: Open-Source Information Reveals Pro-Kremlin Web Campaign. Global Voices, 13 July 2015. Accessed 08 Oct 2015
  10. 10.
    Bazzell, M.: Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 4th edn. CCI Publishing (2014)Google Scholar
  11. 11.
    Etling, B., Kelly, J., Faris, R., Palfrey, J.: Mapping the Arabic blogosphere: politics, culture, and dissent. Berkman Cent. Res. Publ., vol. 6 (2009)Google Scholar
  12. 12.
    Standler, R.B.: Propaganda and How to Recognize it. RBS0, 02 September 2005Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of Information ScienceUniversity of Arkansas at Little RockLittle RockUSA

Personalised recommendations