Start your day with intelligence. Get The OODA Daily Pulse.
With the technological infrastructure that physicists and astronomers have brought to bear for decades as its foundational metaphor, the Stanford Internet Observatory (SIO) was launched two years ago to create an equally as powerful social sciences-based “Observatory” for internet researchers:
“…the political and social sciences have been slow to build their capabilities to study the negative impact of technology, partially due to a lack of data access, information processing resources, and individuals with the necessary backgrounds to sift through exabytes of data. For centuries, physicists and astronomers have coordinated resources to build massive technological infrastructure to further their field. With infinitely expanding data and content, researchers need infrastructural capabilities to research this new information frontier.
The Stanford Internet Observatory is a cross-disciplinary program of research, teaching, and policy engagement for the study of abuse in current information technologies, with a focus on social media. Under the program direction of computer security expert Alex Stamos, the Observatory was created to learn about the abuse of the internet in real-time, to develop a novel curriculum on trust and safety that is a first in computer science, and to translate our research discoveries into training and policy innovations for the public good.
By providing researchers across Stanford with cutting-edge data analytics and machine learning resources we will unlock completely unforeseen fields of research. We envision a world where researchers do not limit themselves to the data that is easy to access but instead dive into the toughest and most important questions by leveraging the capabilities of the Stanford Internet Observatory.”
The work of the team over at the Observatory has been impressive – and we have been tuned in to their efforts since their launch in 2019. If you would like an overview of the “research, teaching, and policy” and the thoughts of the SIO team as they reflect on their “research and refine our path forward as a research center, the following report details their “focus areas and goals for the coming year”: The Stanford Internet Observatory Turns Two.
We now turn to the SIO’s latest offering, in partnership with Graphika: the August 24th release of a joint investigation into “an interconnected web of accounts on Twitter, Facebook, Instagram, and five other social media platforms that used deceptive tactics to promote pro-Western narratives in the Middle East and Central Asia. The platforms’ datasets appear to cover a series of covert campaigns over a period of almost five years rather than one homogeneous operation”…which the SIO authors believe is “the most extensive case of covert pro-Western influence operations on social media to be reviewed and analyzed by open-source researchers to date.” (1)
In Unheard Voice: Evaluating five years of pro-Western covert influence operations (IO), the report by the SIO and Graphika, not only are the insights and findings of the report of interest, but, due to the research infrastructure objectives and overall “charter” of the SIO, so too are the computer science techniques and research methodologies applied to the dataset made available to the researchers by Twitter and Meta:
“In July and August 2022, Twitter and Meta removed two overlapping sets of accounts for violating their platforms’ terms of service. Twitter said the accounts fell foul of its policies on ‘platform manipulation and spam,’ while Meta said the assets on its platforms engaged in ‘coordinated inauthentic behavior.’ After taking down the assets, both platforms provided portions of the activity to Graphika and the Stanford Internet Observatory for further analysis.” (1)
This research is also differentiated by the partnership with Graphika, a private sector company that offers an AI-based, SAAS, and managed services platform to study online communities (which grew out of research at the Harvard Berkman Center and launched in 2013). The turnaround time on the research (at least in this researcher’s experience) is also noteworthy: with full cooperation from the various social medial platforms owned by Twitter and Meta, datasets provided from their platforms in July/August 2022, and a publication of findings on August 2022.
For anyone who has managed corporate-sponsored research (that includes shepherding a proprietary dataset through both university and corporate legal vetting and cooperative research negotiations), this lightning-fast workflow is a clear operational, methodological innovation by the SIO. If the analogy is re-orienting the lens of the observatory telescope at a specific area of activity and data for immediate results, the SIO is functioning as designed.
“As with previous disclosures, Twitter and Meta did not share the technical details of their investigations. Additionally, neither company has publicly attributed the activity to any entity or organization: Twitter listed the activity’s “presumptive countries of origin” as the U.S. and Great Britain, while Meta said the “country of origin” was the U.S. The findings in this report are based on our own open-source investigation and analysis of the two datasets shared by the platform.
The Twitter dataset provided to Graphika and SIO covered:
According to the report, here is what the researchers did with the data:
The decision to focus on the exclusively covert activity represented in two datasets drawn from separate takedowns by Twitter and Meta posed certain methodological challenges. Accordingly, we employed the following practices to build a subset of assets for further analysis:
The major groupings in the map reflect three nations and regions: Iran, Afghanistan, and an Arabic-speaking Middle East group comprising Iraqi and Saudi subgroups, some of which contain a few accounts associated with Syria, Kuwait, and Yemen. In addition to these major groupings, there were smaller community clusters in the network containing mixed international accounts focused loosely on a variety of international figures and organizations. We also encountered an unclustered set of accounts with insufficient data for categorization.
For each of the covert Twitter accounts we identified, we calculated its “follower footprint” in each community cluster, defined as the proportion of accounts in the community cluster that followed it. There was a typical long-tail distribution in the follower footprints, with a few influential accounts followed by a descending list of accounts with progressively fewer followers. The distribution also featured a large set of assets (about 20% of all the suspended covert Twitter assets) with no followers evident among the map’s communities. Accounts with a significant follower footprint showed a clear association with a specific national or regional group in the map.
The method used to construct the network map is designed to reveal the communities in which the covert assets were embedded. We found 60,798 active Twitter accounts that followed at least one of the covert takedown assets on Twitter, and collected follower and following data for each of these. We used an iterative method to find the accounts among these best connected to each other in strong communities, yielding a map of 13,946 densely interconnected accounts. These were clustered based on network relationships into 49 individual community clusters, then further categorized into seven map groupings based on the strength of their relationships with each other and an analyst review of the language, interests, and behavioral characteristics. Five of these map groupings combine further into two analytic parts: Iran (with three groupings) and Middle East Arabic (with two groupings).
After assigning each of the covert assets a label, we were able to visualize activity and posting patterns for each group. This provided an overview of each campaign and the set as a whole. (2)
The information threat vector, cognitive infrastructure, misinformation, and covert influence operations will be discussed (when we gather as the OODA Community in October at OODAcon 2022 – The Future of Exponential Innovation & Disruption) in the context of the panel Future Wars: Beyond Cyberconflict, with:
John Robb, Global Guerrillas Report and Author of Brave New War
J.D. Work, Cyber threat expert and professor at Columbia, NDU, and MCU
Yegor Dubynsky (invited), Ukraine Office of Digital Transformation
A description of the panel: Twenty years ago, cybersecurity experts warned of attacks against power grids and planes falling from the sky. They predicted a future that has not manifested itself yet. Will it? Or will the future of war be a conflict waged for the hearts and minds of social media users? What about the future of conflict in the contested domain of space – not only regarding assets in orbit but space exploration and resource exploitation? What lessons will Russia use from its extensive use of cyber tools against Ukraine? What lessons should defenders learn?
To register for OODAcon, go to: OODAcon 2022 – The Future of Exponential Innovation & Disruption
It should go without saying that tracking threats are critical to inform your actions. This includes reading our OODA Daily Pulse, which will give you insights into the nature of the threat and risks to business operations.
Use OODA Loop to improve your decision-making in any competitive endeavor. Explore OODA Loop
The greatest determinant of your success will be the quality of your decisions. We examine frameworks for understanding and reducing risk while enabling opportunities. Topics include Black Swans, Gray Rhinos, Foresight, Strategy, Strategies, Business Intelligence, and Intelligent Enterprises. Leadership in the modern age is also a key topic in this domain. Explore Decision Intelligence
We track the rapidly changing world of technology with a focus on what leaders need to know to improve decision-making. The future of tech is being created now and we provide insights that enable optimized action based on the future of tech. We provide deep insights into Artificial Intelligence, Machine Learning, Cloud Computing, Quantum Computing, Security Technology, and Space Technology. Explore Disruptive/Exponential Tech
Security and resiliency topics include geopolitical and cyber risk, cyber conflict, cyber diplomacy, cybersecurity, nation-state conflict, non-nation state conflict, global health, international crime, supply chain, and terrorism. Explore Security and Resiliency
The OODA community includes a broad group of decision-makers, analysts, entrepreneurs, government leaders, and tech creators. Interact with and learn from your peers via online monthly meetings, OODA Salons, the OODAcast, in-person conferences, and an online forum. For the most sensitive discussions interact with executive leaders via a closed Wickr channel. The community also has access to a member-only video library. Explore The OODA Community.