Uncovering Coordinated Cross-Platform Information Operations Threatening the Integrity of the 2024 U.S. Presidential Election Online Discussion
Information Operations (IOs) pose a significant threat to the integrity of democratic processes, with the potential to influence election-related online discourse. In anticipation of the 2024 U.S. presidential election, we present a study aimed at uncovering the digital traces of coordinated IOs on...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Information Operations (IOs) pose a significant threat to the integrity of
democratic processes, with the potential to influence election-related online
discourse. In anticipation of the 2024 U.S. presidential election, we present a
study aimed at uncovering the digital traces of coordinated IOs on $\mathbb{X}$
(formerly Twitter). Using our machine learning framework for detecting online
coordination, we analyze a dataset comprising election-related conversations on
$\mathbb{X}$ from May 2024. This reveals a network of coordinated inauthentic
actors, displaying notable similarities in their link-sharing behaviors. Our
analysis shows concerted efforts by these accounts to disseminate misleading,
redundant, and biased information across the Web through a coordinated
cross-platform information operation: The links shared by this network
frequently direct users to other social media platforms or suspicious websites
featuring low-quality political content and, in turn, promoting the same
$\mathbb{X}$ and YouTube accounts. Members of this network also shared
deceptive images generated by AI, accompanied by language attacking political
figures and symbolic imagery intended to convey power and dominance. While
$\mathbb{X}$ has suspended a subset of these accounts, more than 75% of the
coordinated network remains active. Our findings underscore the critical role
of developing computational models to scale up the detection of threats on
large social media platforms, and emphasize the broader implications of these
techniques to detect IOs across the wider Web. |
---|---|
DOI: | 10.48550/arxiv.2409.15402 |