A new formula to better identify Twitter disinformation

A research by Ben Nimmo2 min

2 shares, 1 point

Twitter has been used many times to manipulate information.
Such manipulation comes both from humans and bots.

Some cases got significatn media attention like the United States presidential election of 2016, but others might have slipped unnoticed.

Some examples of  Russian government-linked organization known as the Internet Research Agency (IRA).


We’ve seen fascinating examples like from @fs0c131y with very well-made graphical explanations of the manipulation.

You can check all the 28 tweets in one here.

Or similar from @geoffgolberg on #WeSupportPolandSummit.

Pulled 5.5K recent tweets which include #WeSupportPolandSummit

6.3K accounts tweeted, retweeted, or were mentioned in said tweets

The hashtag is clearly being gamed cc: @benimmopic.twitter.com/iwPhpTmEDe— Geoff Golberg (@geoffgolberg) January 17, 2019

@geoffgolberg now deleted Tweet

Ben Nimmo,  a former Journalist, now working for the Defense at the Atlantic Council’s Digital Forensic Research Lab (DFRLab) is known to be outstanding in analyzing this kind of manipulation.

He’s been attacked by the Kremlin propaganda outlets threatened by the far right and declared dead by bot herders.

Ben Nimmo proposes trough the Oxford Project on Computational Propaganda Workpaper to use a computational method to calculate the extent to which a given flow of Twitter traffic has been subject to manipulation called CMT.

This formula allows comparing different traffic flows against measurable criteria and see which flows appear to have been most subject to manipulation.

The paper goes and compares different phrases and hashtags from Twitter to clearly identify how advanced was a manipulation.

From the paper:

“The lower group of seven control samples clusters together, with a variation of just over four points between the lowest and highest. The upper group, consisting of the two manipulated Gulf samples, begins 1.9 points higher. This suggests that, even in larger and less obviously manipulated cases, the CTM can give a reliable indication of the degree of manipulation to which a traffic flow has been subjected.”

For security researchers, this could be a new and standardized way that could be used to compare and define the magnitude of Twitter disinformation campaigns.

Like it? Share with your friends!

2 shares, 1 point

Internet McNulty. Creating Hacked.wtf to make Cyber Security for everyone.


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Share via
Choose A Format
Trivia quiz
Series of questions with right and wrong answers that intends to check knowledge
Voting to make decisions or determine opinions
Formatted Text with Embeds and Visuals
The Classic Internet Listicles
The Classic Internet Countdowns
Open List
Submit your own item and vote up for the best submission
Ranked List
Upvote or downvote to decide the best list item
Upload your own images to make custom memes
Youtube, Vimeo or Vine Embeds
Soundcloud or Mixcloud Embeds
Photo or GIF
GIF format
Send this to a friend