From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations

IF 2.9 Q1 SOCIAL SCIENCES, INTERDISCIPLINARY Journal of Cybersecurity Pub Date : 2023-01-01 DOI:10.1093/cybsec/tyad016
Ugochukwu Etudo, Christopher Whyte, Victoria Yoon, Niam Yaraghi
{"title":"From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations","authors":"Ugochukwu Etudo, Christopher Whyte, Victoria Yoon, Niam Yaraghi","doi":"10.1093/cybsec/tyad016","DOIUrl":null,"url":null,"abstract":"Abstract Much research on influence operations (IO) and cyber-enabled influence operations (CEIO) rests on the assumption that state-backed digital interference attempts to generically produce sociopolitical division favorable to the perpetrator’s own interests. And yet, the empirical record of malicious IO during the 2010s show that social media manipulation and messaging takes a number of forms. In this article, we survey arguments regarding the targeting tactics and techniques associated with digital age IO and suggest that existing accounts tend to ignore the strategic context of foreign interference. We propose that state-sponsored IO are not unlike conventional political messaging campaigns in that they are an evolving flow of information rooted in several key objectives and assumptions. However, the strategic position of foreign actors as an outside force constrains opportunities for effective manipulation and forces certain operational constraints that shape practice. These outside actors, generally unable to create sensation from nothing without being unveiled, rely on domestic events tied to a broad macrosocial division (e.g. an act of race violence or protest activity) to create the conditions wherein social media manipulation can be leveraged to strategic gain. Once an event occurs, belligerents tailor steps being taken to embed themselves in relevant social networks with the goal of turning that influence toward some action. We illustrate and validate this framework using the content of the Russian Federation’s coordinated trolling campaign against the USA between 2015 and 2016. We deploy an empirical testing approach centered on fear appeals as a likely method for engaging foreign populations relative to some domestic triggering event and find support of our framework. Specifically, we show that while strong associations exist between Russian ad emissions on Facebook and societal unrest in the period, those relationships are not statistically causal. We find a temporal ordering of social media content that is highly suggestive of a fear appeals strategy responsive to macrosocial dividing events. Of unique interest, we also see that malware is targeted to social media populations at later stages of the fear appeal threat lifecycle, implying lessons for those specifically interested in the relationship between CEIO and disinformation tactics.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":"28 1","pages":"0"},"PeriodicalIF":2.9000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Cybersecurity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/cybsec/tyad016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"SOCIAL SCIENCES, INTERDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

Abstract Much research on influence operations (IO) and cyber-enabled influence operations (CEIO) rests on the assumption that state-backed digital interference attempts to generically produce sociopolitical division favorable to the perpetrator’s own interests. And yet, the empirical record of malicious IO during the 2010s show that social media manipulation and messaging takes a number of forms. In this article, we survey arguments regarding the targeting tactics and techniques associated with digital age IO and suggest that existing accounts tend to ignore the strategic context of foreign interference. We propose that state-sponsored IO are not unlike conventional political messaging campaigns in that they are an evolving flow of information rooted in several key objectives and assumptions. However, the strategic position of foreign actors as an outside force constrains opportunities for effective manipulation and forces certain operational constraints that shape practice. These outside actors, generally unable to create sensation from nothing without being unveiled, rely on domestic events tied to a broad macrosocial division (e.g. an act of race violence or protest activity) to create the conditions wherein social media manipulation can be leveraged to strategic gain. Once an event occurs, belligerents tailor steps being taken to embed themselves in relevant social networks with the goal of turning that influence toward some action. We illustrate and validate this framework using the content of the Russian Federation’s coordinated trolling campaign against the USA between 2015 and 2016. We deploy an empirical testing approach centered on fear appeals as a likely method for engaging foreign populations relative to some domestic triggering event and find support of our framework. Specifically, we show that while strong associations exist between Russian ad emissions on Facebook and societal unrest in the period, those relationships are not statistically causal. We find a temporal ordering of social media content that is highly suggestive of a fear appeals strategy responsive to macrosocial dividing events. Of unique interest, we also see that malware is targeted to social media populations at later stages of the fear appeal threat lifecycle, implying lessons for those specifically interested in the relationship between CEIO and disinformation tactics.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
来自俄罗斯的恐惧:恐惧诉求和网络影响行动的模式
关于影响行动(IO)和网络支持影响行动(CEIO)的许多研究都基于这样的假设:国家支持的数字干预试图产生有利于犯罪者自身利益的社会政治分裂。然而,2010年代恶意IO的经验记录表明,社交媒体操纵和消息传递采取了多种形式。在本文中,我们调查了关于与数字时代IO相关的目标策略和技术的争论,并建议现有账户往往忽视外国干预的战略背景。我们认为,国家发起的国际活动与传统的政治信息传递活动没有什么不同,因为它们是基于几个关键目标和假设的不断发展的信息流。然而,外国行动者作为外部力量的战略地位限制了有效操纵的机会,并迫使某些影响实践的操作限制。这些外部行动者通常无法在不被揭露的情况下无中生有地制造轰动,他们依靠与广泛的宏观社会分裂相关的国内事件(例如种族暴力行为或抗议活动)来创造条件,从而利用社交媒体操纵来获得战略利益。一旦事件发生,交战各方就会调整采取的步骤,将自己嵌入相关的社交网络,目标是将这种影响转化为某种行动。我们使用俄罗斯联邦在2015年至2016年期间针对美国的协调网络攻击活动的内容来说明和验证这一框架。我们采用了一种以恐惧诉求为中心的实证测试方法,作为一种可能的方法来吸引外国人口相对于一些国内触发事件,并找到我们框架的支持。具体来说,我们表明,虽然俄罗斯在Facebook上投放的广告与这一时期的社会动荡之间存在强烈的联系,但这些关系在统计上并不是因果关系。我们发现社交媒体内容的时间顺序高度暗示了对宏观社会分裂事件做出反应的恐惧呼吁策略。特别有趣的是,我们还发现恶意软件针对的是处于恐惧吸引力威胁生命周期后期阶段的社交媒体人群,这对于那些对CEIO和虚假信息策略之间关系特别感兴趣的人来说意味着教训。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Cybersecurity
Journal of Cybersecurity SOCIAL SCIENCES, INTERDISCIPLINARY-
CiteScore
6.20
自引率
2.60%
发文量
0
审稿时长
18 weeks
期刊介绍: Journal of Cybersecurity provides a hub around which the interdisciplinary cybersecurity community can form. The journal is committed to providing quality empirical research, as well as scholarship, that is grounded in real-world implications and solutions. Journal of Cybersecurity solicits articles adhering to the following, broadly constructed and interpreted, aspects of cybersecurity: anthropological and cultural studies; computer science and security; security and crime science; cryptography and associated topics; security economics; human factors and psychology; legal aspects of information security; political and policy perspectives; strategy and international relations; and privacy.
期刊最新文献
Narrow windows of opportunity: the limited utility of cyber operations in war ‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment ‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1