Behind the Mask: A Computational Study of Anonymous' Presence on Twitter
- URL: http://arxiv.org/abs/2006.08273v1
- Date: Mon, 15 Jun 2020 10:26:12 GMT
- Title: Behind the Mask: A Computational Study of Anonymous' Presence on Twitter
- Authors: Keenan Jones, Jason R. C. Nurse, Shujun Li (University of Kent)
- Abstract summary: The hacktivist group Anonymous is unusual in its public-facing nature.
Unlike other cybercriminal groups, Anonymous is prevalent on the social media site, Twitter.
We re-examine some key findings reported in previous small-scale qualitative studies of the group.
- Score: 2.2559617939136505
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The hacktivist group Anonymous is unusual in its public-facing nature. Unlike
other cybercriminal groups, which rely on secrecy and privacy for protection,
Anonymous is prevalent on the social media site, Twitter. In this paper we
re-examine some key findings reported in previous small-scale qualitative
studies of the group using a large-scale computational analysis of Anonymous'
presence on Twitter. We specifically refer to reports which reject the group's
claims of leaderlessness, and indicate a fracturing of the group after the
arrests of prominent members in 2011-2013. In our research, we present the
first attempts to use machine learning to identify and analyse the presence of
a network of over 20,000 Anonymous accounts spanning from 2008-2019 on the
Twitter platform. In turn, this research utilises social network analysis (SNA)
and centrality measures to examine the distribution of influence within this
large network, identifying the presence of a small number of highly influential
accounts. Moreover, we present the first study of tweets from some of the
identified key influencer accounts and, through the use of topic modelling,
demonstrate a similarity in overarching subjects of discussion between these
prominent accounts. These findings provide robust, quantitative evidence to
support the claims of smaller-scale, qualitative studies of the Anonymous
collective.
Related papers
- Uncovering Coordinated Cross-Platform Information Operations Threatening the Integrity of the 2024 U.S. Presidential Election Online Discussion [8.557128766155229]
Information Operations pose a significant threat to the integrity of democratic processes.
In anticipation of the 2024 U.S. presidential election, we present a study aimed at uncovering the digital traces of coordinated IOs on $mathbbX$ (formerly Twitter)
Using our machine learning framework for detecting online coordination, we analyze a dataset comprising election-related conversations on $mathbbX$ from May 2024.
arXiv Detail & Related papers (2024-09-23T17:36:14Z) - A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures [50.987594546912725]
Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations.
This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures.
arXiv Detail & Related papers (2024-03-31T12:44:48Z) - Unsupervised detection of coordinated fake-follower campaigns on social
media [1.3035246321276739]
We present a novel unsupervised detection method designed to target a specific category of malicious accounts.
Our framework identifies anomalous following patterns among all the followers of a social media account.
We find that these detected groups of anomalous followers exhibit consistent behavior across multiple accounts.
arXiv Detail & Related papers (2023-10-31T12:30:29Z) - Detecting fake accounts through Generative Adversarial Network in online
social media [0.0]
This paper proposes a novel method using user similarity measures and the Generative Adversarial Network (GAN) algorithm to identify fake user accounts in the Twitter dataset.
Despite the problem's complexity, the method achieves an AUC rate of 80% in classifying and detecting fake accounts.
arXiv Detail & Related papers (2022-10-25T10:20:27Z) - Identification of Twitter Bots based on an Explainable ML Framework: the
US 2020 Elections Case Study [72.61531092316092]
This paper focuses on the design of a novel system for identifying Twitter bots based on labeled Twitter data.
Supervised machine learning (ML) framework is adopted using an Extreme Gradient Boosting (XGBoost) algorithm.
Our study also deploys Shapley Additive Explanations (SHAP) for explaining the ML model predictions.
arXiv Detail & Related papers (2021-12-08T14:12:24Z) - Out of the Shadows: Analyzing Anonymous' Twitter Resurgence during the
2020 Black Lives Matter Protests [6.510061176722249]
Recently, there had been little notable activity from the once prominent hacktivist group, Anonymous.
The group, responsible for activist-based cyber attacks on major businesses and governments, appeared to have fragmented after key members were arrested in 2013.
In response to the major Black Lives Matter protests, however, reports indicated that the group was back.
arXiv Detail & Related papers (2021-07-22T10:18:32Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - A Survey on Computational Propaganda Detection [31.42480765785039]
Propaganda campaigns aim at influencing people's mindset with the purpose of advancing a specific agenda.
They exploit the anonymity of the Internet, the micro-profiling ability of social networks, and the ease of automatically creating and managing coordinated networks of accounts.
arXiv Detail & Related papers (2020-07-15T22:25:51Z) - Keystroke Biometrics in Response to Fake News Propagation in a Global
Pandemic [77.79066811371978]
This work proposes and analyzes the use of keystroke biometrics for content de-anonymization.
Fake news have become a powerful tool to manipulate public opinion, especially during major events.
arXiv Detail & Related papers (2020-05-15T17:56:11Z) - Cross-ethnicity Face Anti-spoofing Recognition Challenge: A Review [79.49390241265337]
Chalearn Face Anti-spoofing Attack Detection Challenge consists of single-modal (e.g., RGB) and multi-modal (e.g., RGB, Depth, Infrared (IR)) tracks.
This paper presents an overview of the challenge, including its design, evaluation protocol and a summary of results.
arXiv Detail & Related papers (2020-04-23T06:43:08Z) - Echo Chambers on Social Media: A comparative analysis [64.2256216637683]
We introduce an operational definition of echo chambers and perform a massive comparative analysis on 1B pieces of contents produced by 1M users on four social media platforms.
We infer the leaning of users about controversial topics and reconstruct their interaction networks by analyzing different features.
We find support for the hypothesis that platforms implementing news feed algorithms like Facebook may elicit the emergence of echo-chambers.
arXiv Detail & Related papers (2020-04-20T20:00:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.