Everyday Erinyes #195

 Posted by at 8:08 am  Politics
Dec 072019
 

Experts in autocracies have pointed out that it is, unfortunately, easy to slip into normalizing the tyrant, hence it is important to hang on to outrage. These incidents which seem to call for the efforts of the Greek Furies (Erinyes) to come and deal with them will, I hope, help with that. As a reminder, though no one really knows how many there were supposed to be, the three names we have are Alecto, Megaera, and Tisiphone. These roughly translate as “unceasing,” “grudging,” and “vengeful destruction.”

I’m pretty sure that no one who is a regular here is a big Twitter user. I know all I ever see from Twitter is isolated tweets embedded by other people, and over have of those are sweet ones about cats and/or dogs, with occasional other animals. But there are progressive people who do use Twitter to communicate (passively or actively), and if you do happen to be one, or if you know one – or even if you just want to know what the latest thing is in disinformation detection, then you will be interested in this.
==================================================================

You can join the effort to expose Twitter bots

Help catch online bots.
maxuser/Shutterstock.com

Pik-Mai Hui, Indiana University and Christopher Torres-Lugo, Indiana University

In the lead-up to the 2018 midterm elections, more than 10,000 automated Twitter accounts got caught conducting a coordinated campaign of tweets to discourage people from voting. These automated accounts may seem authentic to some, but a tool called Botometer was able to identify them while they pretentiously argued and agreed, for example, that “democratic men who vote drown out the voice of women.” We are part of the team that developed this tool that detects the bot accounts on social media.

Our next effort, called BotSlayer, is aimed at helping journalists and the general public spot these automated social media campaigns while they are happening.

It’s the latest step in our research laboratory’s work over the past few years. At Indiana University’s Observatory on Social Media, we are uncovering and analyzing how false and misleading information spreads online.

One focus of our work has been to devise ways to identify inauthentic accounts being run with the help of software, rather than by individual humans. We also develop maps of how online misinformation spreads among people and how it competes with reliable information sources across social media sites.

However, we have also noticed that journalists, political campaigns, small businesses and even the public at large may have a better sense than we do of what online discussions are most likely to attract the attention of those who control automated propaganda systems.

We receive many requests from individuals and organizations who need help collecting and analyzing social media data. That is why, as a public service, we combined many of the capabilities and software tools our observatory has built into a free, unified software package, letting more people join our efforts to identify and combat manipulation and misinformation campaigns.

A dashboard shows how active – and how likely to be automated – Twitter accounts are about certain topics.
Observatory on Social Media, Indiana University, CC BY-ND

Combining different tools

Many of our tools allow users to retrospectively query and examine our collection of a 10% random sample of all Twitter traffic over a long period of time. A user can specify keywords, hashtags, user mentions, locations or user accounts they’re interested in. Our software then collects the matching tweets and looks more deeply at their content by extracting links, hashtags, images, movies, phrases and usernames those tweets contain.

Our trend analysis app looks at how closely that suspicious content trends together. Our network analysis app shows how ideas spread from user to user. Our map app checks the geographical pattern of suspicious activities around important topics.

Our Botometer app then detects how likely it is that elements of the online discussion are being coordinated by a group of automated accounts. Rather than reflecting an authentic discourse of real people, these accounts may in fact be controlled by a person or an organization. These accounts usually act together, with some of them tweeting propaganda or disinformation, and others agreeing and retweeting, forming an inauthentic discourse around them to attract attention and draw real people into the online discussion.

BotSlayer brings all the pieces together, letting a person using it do all those analyses with the entire flow of Twitter traffic.

BotSlayer’s system collects all matching tweets – not just a sample – and saves them in a database for any retrospective investigation. Its web interface, in one screen, shows users in real time the terms and keywords that are part of suspicious activity around their interests. Users can click on icons to search for related information on various websites and social media platforms to look for related malicious efforts elsewhere online.

For example, during the 2018 U.S. midterm election, many bot accounts that were reported on Twitter were also found to be related to Facebook bot accounts with similar profiles.

BotSlayer also provides links to our Hoaxy system, which shows how Twitter accounts interact over time, identifying which accounts are the most influential, and most likely to be spreading disinformation.

Proving useful already

On July 10, 2019, one of our BotSlayer systems, focusing on Twitter activity about U.S. politics, flagged suspicious activity for us to investigate. The system noticed the appearance of a large group of tweets, mostly from brand-new Twitter accounts whose names ended with a string of numbers – like @MariaTu34743110. Those are clues that their activity may be generated by a bot.

They were posting and retweeting links to a single YouTube video attacking a financier named Bill Browder, who has been at the center of a dispute between the United States and the Russian Federation. That shared focus is a clue that all the accounts were part of an interconnected system.

When we dug deeper, we identified more than 80 likely bots coordinating with each other to try to boost widespread attention to Browder’s alleged wrongdoing using the video on YouTube.

Visualization of the coordinated campaign against Bill Browder. At left, a timeline shows the volume of tweets spiking suddenly. At right, the accounts’ interactions are mapped, with likely bots in red, showing how closely interconnected they were.

Plenty of other uses

Other coordinated campaigns have promoted financial scams, often seeking to sell questionable investments in cryptocurrencies. Scammers have impersonated internet celebrities like entrepreneur Elon Musk or software magnate John McAfee.

These accounts are a bit more sophisticated than political-attack bots, with one lead account typically announcing that users can multiply their riches by transferring some of their cryptocurrency into the scammer’s digital wallet. Then other accounts retweet that announcement, in an effort to make the scheme seem legitimate. At times they reply with doctored screenshots claiming to show that the scheme works.

So far, several news, political and civic organizations have tested BotSlayer. They have been able to identify large numbers of accounts that publish hyperpolitical content at a superhuman pace.

The feedback from testers has helped us make the system more robust, powerful and user-friendly.

As our research advances, we will continue to improve on the system, fixing software bugs and adding new features. In the end, we hope that BotSlayer will become a sort of do-it-yourself toolkit enabling journalists and citizens worldwide to expose and combat inauthentic campaigns in social media.

[ Deep knowledge, daily. Sign up for The Conversation’s newsletter. ]The Conversation

Pik-Mai Hui, Ph.D. Student in Informatics and Network Science, Indiana University and Christopher Torres-Lugo, Ph.D. Student in Computer Science, Indiana University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

==================================================================
Alecto, Megaera, and Tisiphone, if there is any way you can help get this software widely distributed into the hands of those who can use it to best advantage, then please, do so.  Also, since it’s sort of an exercise in futility to detect disinformation if you cannot correct it – and be believed – you might see what you can do to encourage research in that area as well.

The Furies and I will be back.

Share

  10 Responses to “Everyday Erinyes #195”

  1. It would be nice if Twitter, Facebook and Instagram cared enough to use such systems. They make lots of noise about their efforts but the Russians (and any other organization creating bots) are always ten steps ahead of them. When someone new follows me, I do it the old fashioned way, I look at their timeline and see what they’ve been up to. Many progressive users do the same (there are other tools) and broadcast names of bots. 
    One can see many were created the same day, some have been lying in wait since 2009. The bad guys have been at this a long time. The string of numbers at the end of a name is a giveaway but Twitter itself will do that if one doesn’t select a name properly so there are legit people with that profile – just not many. I bet I have more people blocked than I do followers though I pay little attention to either. 
    Very nice look at how the troll farms, supremacists and republicans operate, Joanne. Hope everyone is well! :^) gene

  2. Thanks, JD.  If I used Twitter, I’d probably want the system.  Maybe I need it.  I probably should have checked to see if KMitch is a bot! 12

  3. I haven’t visited my twitter account in years–too many unwelcome follower attempts with too much work to get rid of…yet this does provide a good tool for those needing another on-line way to make a difference. Thanks Joanne.

  4. Hi, Gene! So nice to see you here. Hope all is well with you and family too.

    Excellent information, still reading.
    Will pass this on as well. 
    Thanks, Joanne and Furies, for a most interesting post. 

  5. Interesting read, Joanne.

    f I was a Twitter user, I’d welcome such tools. I would have been happy to use it when bots tried to infiltrate my hubby’s website. When someone asked for permission to open an account, I googled any suspect names and the almost always gave me enough information to decide whether they were genuine people or not. With the thousands of people “joining” a popular twitter account, doing such ‘research’ would be nearly impossible nowadays.

  6. Excellent post. Appreciate all of the information you provided about this system. 
    Never joined Twitter, Fakebook, or any other social media. I know that if I had, I would of been thrown out because of my negative words of tRump.
    Hi there Gene. It has been months since we’ve posted on Care2. I too hope you and your family are doing well.
    Thanks Joanne

Sorry, the comment form is closed at this time.