Basic Analysis of Social Media: Examining the use of narrative-based drivers for remote radicalization. (First published 3 August 2016)

Basic analysis

 

As I am fortunate to have a large number of data analysts and those involved in the behaviour sciences among my LinkedIn contacts, I would like to point out this paper is not intended to bring anything new to the study of radicalization or extremist behaviour. I also feel sure that many of my contacts in this field will put forward various other methods which may be used to collect the same datasets mentioned in this paper.

Several years ago, as part of my research into the induction and radicalization process used by AQ affiliates via social media (SM), I spent a considerable amount of time reading academic papers on SM mapping and human behaviour.  This information allowed me to research SM, the web and dark web in order to increase my understanding of the drivers associated with violent extremism (VE) and the mindsets of vulnerable people who may be psychologically manipulated to join the extremist cause. It also allowed me to examine and test new theories put forward by various academics.

The following is a basic introduction to the subject which is based on the research of others and which I have modified for my own research needs. Furthermore, due to the limited scope of this paper I have not included data associated with demography, gender; or the analysis of text and visual images which are to be found in the ‘extremists’ virtual world of their making.

Finally, although I and other members of the Narrative Strategies Team (http://www.narrative-strategies.com/) have a comprehensive understanding of the narrative based drivers associated with VE, I have found the following allows us to examine these drivers working over time and space along with the behavioural changes experienced by some members of the target audience. 

Analysing Social Media (SM networks)

Virtual social networks, like those found in the ‘real’ world, consist of relationships and relationship building blocks. An examination of this network reveals a combination of relationships which create identifiable patterns of connected people, groups and organisations.  As explained later, this virtual social network which appears to allow users to remain anonymous provides a false sense of security where members are willing to express their concerns, frustrations and other personal information which they may not be willing to discuss in the real world. This provides an indication of an individual’s vulnerabilities which may leave them open to psychological manipulation.  When one examines the communications between like mined individuals within this network it may first appear to resemble a peer-group support network which by its very nature encourages additional personal information to be shared with ‘like-minded’ people. Accordingly, extremist groomers and recruiters can select suitable individuals who may be radicalized.  

Virtual Social Networks

It is easier to regard social networks as consisting of social entities: actors, distinct individuals, groups and organisations. We must also be prepared to follow these entities as they migrate to or simultaneously use other SM platforms.  For instance, Twitter is limited to the maximum use of 140 characters (Tweets) and due to this limitation member who are of interests to extremists are often encourage to join a similar network on another SM platform with less restrictions and/or is considered more secure.  Consequently, it is not uncommon to find the same social entities on various SM platforms.

relationship ties

Relationship ties (Contacts)

Some relationships which are tied to others across the network/s are said to be ‘informal’ because they are not widely known by others entities of the network under examination.  For example, on LinkedIn we often find third degree contacts commenting on updates posted by members from outside their network simply because the commentator is connected to one or more of the writers’ first degree contacts.  Such entities, in this example LinkedIn members, are often referred to as ‘Muktiplexity’ or ‘Multiplex’ because these individuals are actors with ties to other actors connected to you. I plan to cover this concept in greater detail at a later date during my examination of Russian trolls and the information war.

The Two Node Network consists of actors who may not have direct ties with each other but they attend similar events within a community (Mosques, sports clubs etc.) or may regularly visit similar websites. Although there are no virtual or physical connections, this provides an opportunity for prominent actors (Focal Actors) to form a false rapport with members of the Two Node Network and the opportunity to form a ‘weak’ link.  The establishment of ‘strong’ links are only attempted after an individual is thought to be of interest to the extremist cause.

Egocentric, also called personal networks, tie directly with Focal actors (those with influence, I.e., groomers, recruiters, propagandists etc.) in the network.  Hanson and Shneiderman describe this as, “Social Centric or complete network consisting of the relational ties among members of a single bounded community. (Social Network Analysis: Measuring, Mapping and Modelling Collections of Connections, D. Hanson and B Shneiderman, 2010).

The examination of networks also allows us to develop what some academics call ‘name generators’ which is simply the names of social entities, in this case people, who frequently communicate with the focal actors.  Hanson and Shneiderman call those names generated by the focal actor, ‘the actors alters’.

The use of name generators, as advocated by Hanson and Shneidrman, allows for the identification of strong ties across a dense network.  To identify weaker ties in more wide ranging networks, acquaintance name generators can be used.

Another useful tool discussed by Hanson and Shneiderman, is the Positioning Generator. This allows the researcher to identify people who fill a particular ‘valued’ role or position within the network and therefore have access to a range of resources. These resources may include professional knowledge, or work related experience beneficial to an extremist group. 

Psychological Manipulation

Apart from the same narrative based drivers being used within the real and virtual world, we also find the same methods used to encourage members of their target audience to express their concerns, frustrations, aspirations and how they see themselves.  This information is used to psychologically manipulate suitable members within the network and tie them to others with similar mindsets. The linking of suitable individuals within a network will often reinforce these concerns and produce suitable conditions for physiological manipulation. A United Nations report describes this as, psychological manipulation, “to undermine an individual’s belief in certain collective social values, or to propagate a sense of heightened anxiety, fear or panic within a population or subset of the population…” (The Use of the Internet for Terrorist Purposes: United Nations Office of Drug and Crime, NY 2012) It is also widely acknowledged that certain cognitive propensities can combine to create a mindset that presents a high risk of being radicalized (see Drivers of Violent Extremism: Hypotheses and Literature Review, RUSI, 16 October 2015) and it is these propensities which extremists seek to identify within members of the network.

Social media has made social connections and networks more visible and open to research. “The internet and its use by terrorist organisations, individual members, supporters and recruits afford new avenues for assessing information about groups and their activities…” (Lorraine Bowman-Grieve, Security Informatics, 2013, 2:9) As Bowman-Grieve says, “individual reasons why people become involved are many and varied, with no single catalyst event that explains involvement.” However, research indicates that involvement is a gradual process that occurs over time and the development of this process, which is driven by narratives and supported by inter-personal bonds that have been created for this purpose, can be examined through social network analysis.

By analysing network activities over a period of time not only do we see the use of narratives as efficient drivers towards extremism, we also see the development of identities being slowly formed. This includes perceived victimization and attempts to convince individuals they are victims and linking this to a common or shared identity and the legitimization of violence to address these perceived injustices. We also see the development of dualist thinking which supports the extremist’s’ view of the world, other cultures, religions and western society. 

PDF version for downloading

 

Alan Malcher

Narrative Warfare (MA Global Security)

More on the MA in global security: https://spgs.asu.edu/global-security-ma

Ajit Maan, a new professor of practice in the School of Politics and Global Studies and an affiliated faculty member with the Center on Future of War, was in Tempe this July to film a lecture for her first semester teaching online at Arizona State University. Maan is an internationally-recognized security and defense analysist and narrative strategist. In 1999, she published her breakthrough theory of Internarrative Identity. Then in 2014 Maan published, Counter-Terrorism: Narrative Strategies, which focuses on deconstructing dominant and coercive narratives and demonstrates how certain narrative structures lend themselves to manipulation and how the weaknesses of those structures can be exploited. Most recently, in 2017, she coined the term “Narrative Warfare” to refine what has been referred to as information wars and psychological warfare

The Coronavirus Disinformation System: Useful links

Russian pro-Kremlin media have mounted a “significant disinformation campaign” to aggravate the coronavirus pandemic crisis in western countries by destroying confidence in the emergency response, according to an internal EU report. 

The effort aims to stoke “confusion, panic and fear” and stop people obtaining good information about the contagion, as part of a broader strategy to “subvert European societies from within”, the European diplomatic service analysis says… Read more

https://www.ft.com/content/d65736da-684e-11ea-800d-da70cff6e4d3

EEAS SPECIAL REPORT: Disinformation on the CORONAVIRUS – Sort Assessment of the information environment

The Coronavirus Disinformation System: How It Works

Fighting disinformation fighting facts from fiction

https://ec.europa.eu/info/live-work-travel-eu/health/coronavirus-response/fighting-disinformation_en

Stemming the Tide of Global Disinformation

Council on Foreign Relations

Panellists discuss the extent of disinformation, its impact on democracy, and what can be done to prevent, mitigate, and stop its spread.

Although the panellists discuss threats against American democracy it is important to stress all democratic nations continue to be bombarded with disinformation from state and non-state players and disinformation is a serious global issue.

Speakers

Paul M. Barrett

Deputy Director, Center for Business and Human Rights, NYU Stern School of Business; Adjunct Professor of Law, NYU School of Law

Amanda Bennett

Director, Voice of America

Richard Stengel

Former Undersecretary for Public Diplomacy and Public Affairs, U.S. Department of State; Author, Information Wars: How We Lost the Global Battle Against Disinformation, and What We Can Do About It.

Presider

Nicholas Thompson, Editor in Chief, Wired Magazine

The Council on Foreign Relations (CFR) promotes itself as:  “an independent, nonpartisan membership organisation, think tank, and publisher.”

Disinformation (Operation InfeKtion): How Russia Perfected the Art of War | NYT Opinion

“Russia’s meddling in the United States’ elections is not a hoax. It’s the culmination of  Moscow’s decades-long campaign to tear the West apart. “Operation InfeKtion” reveals the ways in which one of the Soviets’ central tactics — the promulgation of lies about America — continues today, from Pizzagate to George Soros conspiracies. Meet the KGB spies who conceived this virus and the American truth squads who tried — and are still trying — to fight it. Countries from Pakistan to Brazil are now debating reality, and in Vladimir Putin’s greatest triumph, Americans are using Russia’s playbook against one another without the faintest clue.” (The New York Times)

Russia and Information Warfare: Aims, Tools and Implications for the West

Video produced in 2017 but still relevant for today’s information landscape.

An interview with Keir Giles, Director, Conflict Studies Research Centre; Associate Fellow, Russia and Eurasia Programme at Chatham House.

  • How can the West counter Russia’s cyber and psychological operations? 
  • Can we talk about a “militarization” of information in Russia?

Recommended readings- non-kinetic warfare

This page provides a brief description by authors and links  to their books, academic papers and articles on non-kinetic warfare and is updated each month.

Books

Narrative Warfare, a Primer and Study guide

Narrative Warfare, a primer and study guide, is literally, a first of a kind and ground-breaking in its intent. The intent of this book is to give national security professionals and other interested parties a baseline understanding of narrative and its principles regarding the potential for predictably triggering behaviour. If we are to succeed on the battlefield of influence, understanding narrative is an imperative…   See more https://medium.com/@paulcobaugh/narrative-warfare-a-primer-and-study-guide-6ccae8d34397

Plato’s Fear Paperback – March 12, 2020

by Ajit Maan Ph.D.

Powerful narratives don’t simply target an audience; they create the target audience. The identity component of narrative is missing from assumptions that narrative is just a mode of communication. Narrative is the most fundamental tool of power. It is the means through which power gets institutionalized. Narratives are told to someone’s advantage and very powerful narratives may even preclude the telling of any alternative. But it is also a means by which power can be exposed, questioned, under-mined, and made to answer for itself…

Ajit Maan, Ph.D. is a security and defence policy analyst and a specialist in narrative strategies in radicalization processes. She is faculty at Union Institute and University’s Interdisciplinary Doctoral Program, George Mason University’s Centre for Narrative Conflict Resolution, and is member of The Brain Trust of the Weaponized Narrative Initiative at Arizona State University.

https://www.amazon.com/dp/B085RVQ4DK?ref_=pe_3052080_397514860

Soft Power on Hard Problems

This book is a practice in military civics. This collection of international perspectives challenges commonly held assumptions and outmoded paradigms of engagement. The authors share the view that the over-reliance on kinetic approaches over influence operations account for some of the failures of nations against extremists…

Information Warfare: The Lost Tradecraft Kindle Edition

by Howard Gambrill Clark (Author)

Dr. Howard Gambrill Clark, Ph.D. is a Yale graduate with twenty years of experience and research in countering violent extremism and counterterrorism: U.S. Marine Corps intelligence officer and special unit commander (Iraq, Afghanistan, and Philippines); White House National Economic Council counterterrorism analyst; Department of Homeland Security Senior Intelligence Officer for Headquarters Operations Directorate and Senior Intelligence Analyst for Counter Radicalization; and Special Operations Command senior consultant and trainer for countering violent extremism and stability operations as well as service to the U.S. Information Agency and U.S. Senate Defense Appropriations Subcommittee. He received his doctorate from King’s College London War Studies.

Articles and papers available on the internet

PERSPECTIVE: Anatomy of Narrative Warfare and Social Media Ops Since the Last Election

October 30, 2018  Paul Cobaugh (Published by Homeland Security Today)

What follows is some basic perspective about where and how this type of analysis fits into the national security landscape. Of note, I will say that the topic is complex, to say the least. A great deal of scrutiny regarding the findings of this excellent piece of work is not only due but required for national security professionals in addition to well-informed citizens from other walks of life. Protecting the nation from malign influence is not exclusively the role of professionals but also the responsibility of citizenship. In terms of protecting the homeland, this study does, though, provide some of the best large-scale insights for national security professionals to date…

Mr. Paul Cobaugh retired from the US Army as a Warrant Officer after a distinguished career in the US Special Operations CT community, primarily focused on mitigating adversarial influence and advancing US objectives by way of influence. Throughout his career he has focused on the centrality of influence in modern conflict whether it be from extremist organisations or state actors employing influence against the US and our Allies. Post military career he was offered and accepted the position of Vice President at Narrative Strategies, a US based Think-Do Tank which specializes in the non-kinetic aspects of conflict. He has also co-authored, Soft Power on Hard Problems, Hamilton Publishing, 2017 and Introduction to Narrative Warfare: A Primer and Study Guide, Amazon, 2018

Narrative Warfare by Paul Cobaugh published 21 January 2019

Narrative Warfare, continues to come into prominence in the wake of modern Russian Active Measures styled warfare against her adversaries, both real and perceived…

More information on these and other subject matter experts working in the field of narrative warfare can be found at https://www.narrative-strategies.com/

Russian trolls expose misinformation operations

Former employees of a Russian ‘troll factory’ are speaking out about the political misinformation operations .

An interview with a Russian ex-troll

Ex-Russian troll reveals the goal to set Americans against their own government.

Inside Kremlin Propaganda Machine: Russian blogger exposes Russia’s Internet troll factory.

This non-descript office building in Moscow is where the Kremlin houses its army of thousands of internet trolls. They have become infamous over the last year; spamming the World Wide Web with lies, misinformation and propaganda. But this part of the Kremlin’s hybrid warfare aginast Ukraine and the West at large has been exposed by a Russian journalist. Lyudmila Savchuk calls it a troll factory and says she had spent two months there as an employee documenting the process of creating a wave of pro-Kremlin propaganda. “They get work specifications.

There are several main topics including Ukraine, USA and the EU – in general all main topics which are on the agenda – and also Russian opposition. Main opposition figures are regularly insulted and discredited on the Internet.” According to Savchuk, she and her fellow colleagues worked under tight control and signed a non-disclosure agreement. She also says the comments were made not only in Russian but in several other languages across different platforms.

Information Warfare: Defining and analysing/History as a means to win the information battle

Information Warfare Defining and Analysing – CyCon 2019

The 11th International Conference on Cyber Conflict (CyCon 2019) organized by NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn revolved around the theme of Silent Battle. The defence community is nearing a stage where it can precisely define information warfare but is yet to reach a consensus on how best to analyse it. 

The panel entitled ´Information Warfare: defining and analyzing´ will assess some of the emerging methodologies that researchers have been using to identify and analyse digital information operations, with a special focus on the applicability of Social Network Analysis (SNA) in the cyber arena. Speakers and Topics: – Social Network Analysis and the Disinformation Kill Chain by Renee DiResta, Mozilla Fellow, Media Misinformation and Trust – Challenges and Opportunities to Counter Information Operations Through Social Network Analysis and Theory by Alicia Marie Bargar, Research Engineer, Johns Hopkins Applied Physics Laboratory – Hostile Information Environment Analysis by MAJ Geoff Nicholls, Officer, The British Army Moderator: Donara Barojan, DFR Lab / NATO StratCom COE The NATO CCDCOE is a NATO-accredited cyber defence hub focusing on research, training and exercises. 

The international military organisation based in Estonia is a community of currently 25 nations providing a 360-degree look at cyber defence, with expertise in the areas of technology, strategy, operations and law. **Note that some CyCon 2019 presentations were submitted and created in a personal capacity and are not necessarily affiliated with, nor representative of, the views of the speakers’ respective organisations**

Understanding History as means to win Information Warfare Battle: Aleksandras Matonis at TEDxVilnius

Aleksandras Matonis is diplomat, journalist and editor at Lithuanian National Radio and Television. 

Aleksandras believes that country’s history – the way it is perceived by different nations – is a strong tool for creating national identity. Aleksandras is creator of recently released educational movie about the Battle of Grunwald – movie based on Swedish professor Sven Ekdahl theory which he wrote after studying secret historic archives for the past few decades.

 He claims that the facts we are used to hear about this battle are not the ones that are scientifically proved. In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.* (*Subject to certain rules and regulations)

Narrative Strategies – the weaponization of information

Thank you for the encouraging messages I continue to receive regarding the content of this website.  I would like to take this opportunity to answer a regular question regarding my academic activities with Narrative Strategies.

 I am still a member of the Washington DC based think tank and consultancy Narrative Strategies and continue to work with subject matter experts from various disciplines researching and identifying new developments in the field of information warfare which is being  conducted by state and non-state players.  

This is my personal blog and has no connection with Narrative Strategies but further information regarding the  ongoing research in this field of non-kinetic warfare including the weaponization of information can be found by visiting the link below.

Again, thank you for your positive comments

Regards

Alan