33 - Digital Forensics: Repurposing Google Analytics IDs
Summary
Abstract
This chapter describes a network discovery technique on the basis of websites sharing the same Google Analytics and/or AdSense IDs.
Keywords: digital methods, digital forensics, anonymous sources, network mapping, Google Analytics, data journalism
When an investigative journalist uncovered a covert network of Russian websites in July 2015 furnishing disinformation about Ukraine, not only did this revelation portend the state-sponsored influence campaigning prior to the 2016 US presidential elections, it also popularized a network discovery technique for data journalists and social researchers (Alexander, 2015). Which websites share the same Google Analytics ID (see Figure 33.1)? If the websites share the same ID, it follows that they are operated by the same registrant, be it an individual, organization or media group. The journalist, Lawrence Alexander, was prompted in his work by the lack of a source behind emaidan.com.ua, a website that appears to give information about the Euromaidan protests in 2013–2014 in Ukraine that ultimately upended the pro-Russian Ukrainian president in favour of a pro-Western one. In search of the source, and “intrigued by its anonymity,” Alexander (2015) dug into the website code.
Viewing the source code of the web page, he found a Google Analytics ID, which he inserted into reverse lookup software that furnishes a list of other websites using the same ID. He found a (star-shaped) network of a Google Analytics ID linked to eight other websites (in Figure 33.1 at the top of the diagram), sharing a similar anti-Ukraine narrative. One of those websites also used an additional Google Analytics ID, which led to another cluster of related websites (in Figure 33.1 at the bottom to the right), also of similar political persuasion. Examining the WHOIS records of several of these domains, he found an associated email address, and subsequently a person's profile and photo on VKontakte, the Russian social networking site. The name of this person he then found on a leaked list of employees from the Internet Research Agency in St Petersburg, known as the workplace of the Russian government-sponsored “troll army” (Chen, 2015; Toler, 2015). Drawing links between data points, Alexander put a name and face on a so-called Russian troll. He also humanized the troll, somewhat, by pointing to his Pinterest hobby page, where there is posted a picture of Russian space achievements. The troll is a Cosmonaut space fan, too.
- Type
- Chapter
- Information
- The Data Journalism HandbookTowards A Critical Data Practice, pp. 241 - 245Publisher: Amsterdam University PressPrint publication year: 2021