Bots tweaking pre-election Twitter trends in India: US experts

Agencies
April 9, 2019

New Delhi, Apr 9: In the run-up to the general elections, automated Twitter bots made a massive attempt to boost political hashtags, both in support of and in opposition to Prime Minster Narendra Modi, according to a research conducted by US experts. 

The automated accounts were deployed on a massive scale on February 9-10, with small groups of accounts pushing out thousands of posts an hour, according to the team from the US think-tank Atlantic Council's Digital Forensic Research Lab (DFRLab). 

The accounts were domestic in origin and substance, researchers said. 

While bots were used on both sides on February 9-10, the pro-Modi traffic was far more heavily manipulated than the anti-Modi traffic. 

According to the team, the pro-Modi traffic far more heavily manipulated than any large-scale traffic flow the DFRLab has analysed as of yet. 

"The incident highlights the sheer scale of attempts to manipulate Twitter traffic as India's main political parties head to the polls. It also underlines the extent to which social media more broadly has become an electoral battleground," the researchers wrote in a blog post.

Ben Nimmo, Senior Fellow for Information Defense at the DFRLab took to Twitter to highlight the findings. 

"These manipulation attempts ranged from large to extreme," Nimmo wrote in a Twitter post. 

"They were too clumsy to have much impact, but the sheer scale of the attempts on both sides is worrying, ahead of the election," Nimmo said. 

While the scale of the activity was vast, its impact was rather muted given the relatively low number of followers of the accounts. 

The massive scale of the attempted manipulation nevertheless bodes ill for the quality of online debate in India as the election approaches. 

It remains important to be able to expose such efforts, researchers said. 

The DFRLab scanned traffic on the hashtag #TNwelcomesModi, short for "Tamil Nadu welcomes Modi," which trended in India on February 9-10 and was mentioned over 777,000 times in two days. 

The most frequently posting account was @SasiMaha6, which posted #TNwelcomesModi tweets 1,803 times during the scan, or roughly one tweet every 15 seconds. 

Another high-volume account was @priyamanaval6, which posted the hashtag 1,677 times, or roughly one tweet every 17 seconds for over seven hours. 

These sustained rates are far too high for human posting, researchers said. The top three accounts alone posted #TNwelcomesModi 4,914 times, or roughly 10 percent of all traffic in the scan. 

The 50 most active accounts generated 30,446 tweets, or 61.2 percent of all traffic. 

The bot-driven praise for Modi's visit was countered, in part, by bots. On February 10, the hashtag #GoBackModi also trended, pushing messages that supported the Congress Party. 

This hashtag trended even faster, racking up 49,538 tweets in just over three hours in the early morning of February 10. It peaked at a lower rate, however, generating 447,000 posts on February 9-10. 

Just like #TNwelcomesModi, #GoBackModi was heavily pushed by a small number of high-volume accounts that posted hundreds of times an hour. Unlike #TNwelcomesModi, these accounts were still not suspended at the time of drafting. 

The most active was @PhillyTdp, which posted on #GoBackModi 2,179 times as the hashtag took off -- a staggering one tweet every 5.3 seconds for over three hours. 

Other accounts were similarly hyperactive. The second most active, @nritdpusa, posted 1,899 times in three hours, or roughly one tweet every 6 seconds. 

Overall, the nearly 50,000 tweets in the #TNwelcomesModi scan were posted by just 891 accounts, while the nearly 50,000 tweets in the #GoBackModi scan were posted by 7,394 accounts. 

By any measure, #TNwelcomesModi saw a much more aggressive attempt to make the hashtag trend from a much smaller user base, researchers wrote in the blog.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 17,2024

rain.jpg

Bengaluru: The India Meteorological Department (IMD) on Friday forecast heavy rainfall and thunderstorms in a few districts of Karnataka and said Bengaluru is likely to witness light to moderate rain and thunderstorms, with temperatures ranging from 30 degree Celsius to 22 degree Celsius in the next 24 hours.

Shivamogga, Chikkamagaluru, Kodagu, Hassan, Mysuru, Mandya, Chamrajanagara, Udupi and Dakshina Kannada districts are likely to experience heavy to very heavy rainfalls between May 17 and 21, said C S Patil, Director of Meteorological Centre, India Meteorological Department, Bengaluru.

According to India Meteorological Department, some places in Kodagu, Hassan, Mysuru, Mandya and Tumukuru districts will also witness, gusty winds (40-50 kmph) on May 18.

Moderate rain and thundershowers are also likely in Chikkaballapura, Chitradurga, Davangere, Kolar, Ramanagara and Vijayanagara districts.

IMD also predicts light to moderate rain very likely at some places over Bagalkote, Belagavi, Bidar, Dharwad, Gadag, Haveri, Kalaburgi, Koppal, Raichur and Yadgir districts.

On May 16, Channagiri in Davanagere district received the highest rainfall of 6 cm. 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 11,2024

prakashhindu.jpg

Madikeri, May 11: Kodagu police have apprehended the man allegedly responsible for the brutal murder of a minor girl within the confines of Kumbaragadige village in Karnataka's Somwarpet taluk. 

Kodagu Superintendent of Police, K Ramarajan, disclosed that the arrested individual is Prakash (32) from Hammiyala village in Somwarpet taluk. However, authorities are still in the process of recovering the severed head of the victim. The perpetrator had absconded with the victim's severed head after committing the crime. 

Search operations for the suspect commenced late on Thursday night (May 9), with officials diligently pursuing leads. Acting on information suggesting the suspect's presence in a forested area near the village, the police swiftly moved in and apprehended him.

The victim US Meena, 15, a student of Surlabbi High School, had passed the SSLC examinations, the results of which were announced on May. One same day, she was murdered. 

Reportedly, the engagement of the minor girl with the suspect was thwarted by officials from the Women and Child Development department. Subsequently, officials persuaded the girl's parents against proceeding with the marriage. 

However, despite these interventions, the suspect forcibly entered her residence during the night, purportedly abducted her, and later perpetrated the heinous crime in a wooded area on the outskirts of the forest, before absconding with her severed head.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 17,2024

anjalivishwa.jpg

Hubballi, May 17: Karnataka Police have arrested the killer, Vishwa, also known as Girish, in the sensational Anjali Ambigera murder case, police said on Friday.

Preliminary investigations reveal that Vishwa was a habitual thief who exploited innocent young women. The accused is also a drunkard and was caught while attempting to commit theft. He was also part of a gang which stole bikes.

The accused targeted gullible young women, enacting a drama of love and playing the emotional card to forcefully extort gold, silver, and cash from them. When Anjali did not agree to any of his attempts to rob her and outrightly rejected his offer to go with him to Mysuru city, he brutally killed her.

The police had formed two teams to hunt down the killer. One of the teams was searching in the south Karnataka region, and another team, which launched a hunt in Davanagere, nabbed him. The accused was arrested by the police on Thursday.

The police could not catch him sooner as the killer did not carry a mobile phone and did not use his phone for 15 days, before murdering Anjali. The jurisdictional Bendigeri Police were aware of the killer's history, but even after the complaint by the girl’s family, they showed "utter negligence".

The 24-year-old Vishwa entered Anjali Ambigera's (20) residence at 5.30 A.M. on Wednesday and stabbed the young woman multiple times before she could react. Vishwa dragged Anjali Ambigera all over the house, kicking and stabbing her. Later, he pushed her into the kitchen where he stabbed her repeatedly.

Despite efforts by Anjali’s grandmother and two sisters to stop the attacker, he killed her and managed to flee. The incident occurred in the Veerapura Oni area within the jurisdiction of the Bendigeri Police Station.

Vishwa had been blackmailing Anjali and pressurising her to accompany him to Mysuru without informing her parents. The incident which took place close on the heels of MCA student Neha Hiremath’s brutal murder by the jilted lover has raised concern over the safety of women all across the state.

The BJP had demanded the resignation of Home Minister G. Parameshwara while the Congress leaders have also demanded that the Hubballi-Dharwad Police Commissioner Renuka Sukumar should be transferred for failing to sensitise the police force regarding issues of women’s safety.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.