

We have uncovered many examples of coordinated inauthentic behavior.

By Dr. Filippo Menczer
Professor of Informatics and Computer Science
Luddy School of Informatics, Computing, and Engineering
Indiana University
Introduction
Foreign influence campaigns, or information operations,ย have been widespreadย in the run-up to the 2024 U.S. presidential election. Influence campaigns are large-scale efforts to shift public opinion, push false narratives or change behaviors among a target population.ย Russia,ย China,ย Iran,ย Israelย and other nations have run these campaigns by exploitingย social bots,ย influencers,ย media companiesย andย generative AI.
At the Indiana Universityย Observatory on Social Media, my colleaguesย and Iย study influence campaigns and design technical solutions โ algorithms โย to detectย and counter them.ย State-of-the-art methodsย developed in our center use several indicators of this type of online activity, which researchers call inauthentic coordinated behavior. We identify clusters of social media accounts that post in a synchronized fashion, amplify the same groups of users, share identical sets of links, images or hashtags, or performย suspiciously similar sequences of actions.
We have uncovered many examples of coordinated inauthentic behavior. For example, we found accounts that flood the network with tens or hundreds of thousands of posts in a single day. The same campaign can post a message with one account and then have other accounts that its organizers also control โlikeโ and โunlikeโ it hundreds of times in a short time span. Once the campaign achieves its objective, all these messages can beย deleted to evade detection. Using these tricks, foreign governments and their agents can manipulate social media algorithms that determine what is trending and what is engaging to decide what users see in their feeds.
Generative AI
One technique increasingly being used is creating and managing armies of fake accounts with generative artificial intelligence. We analyzed 1,420 fake Twitter โ now X โ accounts that usedย AI-generated facesย for their profile pictures. These accounts were used to spread scams, disseminate spam and amplify coordinated messages, among other activities.
We estimate that at least 10,000 accounts like these were active daily on the platform, and that was before X CEO Elon Muskย dramatically cut the platformโs trust and safety teams. We also identified a network of 1,140ย bots that used ChatGPTย to generate humanlike content to promote fake news websites and cryptocurrency scams.
In addition to posting machine-generated content, harmful comments and stolen images, these bots engaged with each other and with humans through replies and retweets. Current state-of-the-art large language model content detectors areย unable to distinguishย between AI-enabled social bots and human accounts in the wild.
Model Misbehavior
The consequences of such operations are difficult to evaluate due to the challenges posed byย collectingย dataย and carrying outย ethical experimentsย that would influence online communities. Therefore it is unclear, for example, whether online influence campaigns canย sway election outcomes. Yet, it is vital to understand societyโs vulnerability to different manipulation tactics.
In a recent paper, we introduced a social media model called SimSoM thatย simulates how information spreads through the social network. The model has the key ingredients of platforms such as Instagram, X, Threads, Bluesky and Mastodon: an empirical follower network, a feed algorithm, sharing and resharing mechanisms, and metrics for content quality, appeal and engagement.
SimSoM allows researchers to explore scenarios in which the network is manipulated by malicious agents who control inauthentic accounts. These bad actors aim to spread low-quality information, such as disinformation, conspiracy theories, malware or other harmful messages. We can estimate the effects of adversarial manipulation tactics by measuring the quality of information that targeted users are exposed to in the network.

We simulated scenarios to evaluate the effect of three manipulation tactics. First, infiltration: having fake accounts create believable interactions with human users in a target community, getting those users to follow them. Second, deception: having the fake accounts post engaging content, likely to be reshared by the target users. Bots can do this by, for example, leveraging emotional responses and political alignment. Third, flooding: posting high volumes of content.
Our model shows that infiltration is the most effective tactic, reducing the average quality of content in the system by more than 50%. Such harm can be further compounded by flooding the network with low-quality yet appealing content, thus reducing quality by 70%.
Curbing Coordinated Manipulation
We have observed all these tactics in the wild. Of particular concern is that generative AI models can make it much easier and cheaper for malicious agents to create and manage believable accounts. Further, they can use generative AI to interact nonstop with humans and create and post harmful but engaging content on a wide scale. All these capabilities are being used to infiltrate social media usersโ networks and flood their feeds with deceptive posts.
These insights suggest that social media platforms should engage inย more โ not less โ content moderationย to identify and hinder manipulation campaigns and thereby increase their usersโ resilience to the campaigns.
The platforms can do this by making it more difficult for malicious agents to create fake accounts and to post automatically. They can also challenge accounts that post at very high rates to prove that they are human. They canย add frictionย in combination with educational efforts, such asย nudging users to reshare accurate information. And they can educate users about their vulnerability to deceptive AI-generated content.
Open-source AI models and data make it possible for malicious agents to build their own generative AI tools. Regulation should therefore targetย AI content disseminationย via social media platforms rather then AI content generation. For instance, before a large number of people can be exposed to some content, a platform could require its creator to prove its accuracy or provenance.
These types of content moderation wouldย protect, rather than censor, free speechย in the modern public squares. The right of free speech is not a right of exposure, and since peopleโs attention is limited, influence operations can be, in effect, a form of censorship by making authentic voices and opinions less visible.
Originally published by The Conversation, 10.08.2024, under the terms of a Creative Commons Attribution/No derivatives license.


