This past Sunday (May 9th) was Mother's Day in multiple countries, and someone apparently chose to mark the occasion by creating a spam botnet to spread feel-good content related to #Xinjiang, China. #HolidayAstroturf
This botnet consists of 65 accounts with default profile pics created on May 9th, 2021. All have tweeted exactly three times, with the exception of @CaraLambrecht, which has only tweeted twice. All tweets thus far were (supposedly) sent via Twitter for Android.
Each account in this botnet has tweeted the same three tweets in the same order (again, with the exception of @CaraLambrecht, which skipped one). The most recent tweet from each account is a Xinhua YouTube video of children (allegedly in Xinjiang) saying "happy Mother's Day".
We found a second astroturf network pushing the same "#Mother's Day Greetings from #Xinjiang" YouTube video. This network consists of 94 accounts with default profile pics created over a two-week period in May 2020. This network tweets via the Twitter Web App.
This network's tweets are repetitive, with tweets disputing reports of human rights abuses in Xinjiang and tweets about terrorism and separatism in Xinjiang as recurring themes. A few tweets countering US right-wing claims that China caused the COVID-19 pandemic turn up as well.
This network has a recurring glitch: many of its tweets contain links that don't work due to the lack of a space between the links and the tweet text. These glitchy tweets are generally duplicated across multiple accounts in the network.
Finally, who does this network follow? Mostly big accounts with millions or tens of millions of followers, so a small botnet doesn't really do much to inflate their follower counts. @nytimes is the only account followed by all 94 bots in the network.
This is not the first time we've encountered astroturf networks focused on Xinjiang. Some previous examples:
12 questions for @TheDailyBeast regarding @JakeLahut's false April 2023 story, "How Ron DeSantis Is Taking a Page Out of Nixon’s Playbook", which (among other things) falsely portrays an AI-generated face as a "sexually graphic meme" of a real child.
@JoannaColes @TracyConnor
First, some background and a couple debunks of the false article, for those unfamiliar with the situation:
1. How did the decision to use serial fabulist Steven Jarvis as a source for this article come about?
2. Was anyone employed by or affiliated with The Daily Beast at the time the article was published aware of Steven Jarvis's extensive history of making false claims?
Meet @LovewinnLove (permanent ID 2707213009), a blue-check verified account with a GAN-generated face and a few additional odd characteristics. Despite being created in 2014, this account has no posts prior to October 2023.
cc: @ZellaQuixote
There are multiple indicators that @LovewinnLove's "face" is GAN-generated:
• unrealistic teeth (visible portion of bottom teeth is especially bizarre)
• odd texturing and seams in shirt fabric
• telltale eye positioning (more info in next post)
@LovewinnLove All unmodified StyleGAN-generated face images have the property that the major facial features (particularly the eyes) are in the same position on each image. Blending @LovewinnLove's profile image with 99 other GAN-generated faces demonstrates this nicely.
It's New Year's Eve, and a bunch of politics enthusiasts with GAN-generated faces are enthusiastically replying to a variety of posts with similarly-worded replies. #NewYearShenaniGANs
cc: @ZellaQuixote
The politics enthusiasts are part of a spam network consisting of (at least) 575 accounts created between May and December 2023 with GAN-generated faces. Many of their handles, such as @Maairiuieinaaa and @eJooeiaAoneueer, contain long strings of vowels.
@Maairiuieinaaa @eJooeiaAoneueer All 575 of these accounts use StyleGAN-generated faces as profile images. Some of these, such as @MauMoiagaia's profile image, contain a tiny "StyleGAN 2 (Karras et al.)" watermark in the lower right corner.
It's a great day to look at a network of inauthentic accounts that post identical AI art images (with a side of good old fashioned T-shirt spam).
cc: @ZellaQuixote
This network consists of 24 X accounts. 12 of these accounts were created in the latter half of 2023 and have female avatars, while the other 12 were created in 2013 or earlier and have male avatars.
The 12 accounts with female avatars and 2023 creation dates regularly post AI-generated art images, and these image posts are quickly reposted by other accounts in the network (both female and male). The AI-generated images are often duplicated across accounts.
Meet @ImJamesMiller (permanent ID 1371651462153994242), an account with a GAN-generated face, 172K followers, and no tweets prior to two days ago. What's up with that?
cc: @ZellaQuixote
As it turns out, @ImJamesMiller wasn't always named @ImJamesMiller. In June, the account was named @/IamJimCaviezel in an apparent attempt to impersonate Sound of Freedom actor Jim Caviezel.
@ImJamesMiller Multiple prominent users appear to have accepted the fake Jim Caviezel account as legitimate, including Texas Congressman Brian Babin, right-wing influencer/ex-Game of Thrones blogger Jack Posobiec, and recently indicted ex-Assistant Attorney General Jeff Clark.
It's a great day to look at a network of Bluesky spam accounts with randomized names. #SundaySpam
cc: @ZellaQuixote
This spam network consists of (at least) 401 accounts, all of which were created (or added to the Bluesky app view) in August 2023. These accounts do not follow each other; rather, each one follows a small number of popular Bluesky accounts.
The accounts in this network cycle rhythmically between posting three types of content:
• reposts
• posts containing links to news articles
• posts containing links to news articles accompanied by images