skip to main content
10.1145/3341161.3342878acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

A postmortem of suspended Twitter accounts in the 2016 U.S. presidential election

Published:15 January 2020Publication History

ABSTRACT

Social media sites such as Twitter have faced significant pressure to mitigate spam and abuse on their platform in the aftermath of congressional investigations into Russian interference in the 2016 U.S. presidential election. Twitter publicly acknowledged the exploitation of their platform and has since conducted aggressive cleanups to suspend the involved accounts. To shed light on Twitter's countermeasures, we conduct a postmortem analysis of about one million Twitter accounts who engaged in the 2016 U.S. presidential election but were later suspended by Twitter. To systematically analyze coordinated activities of these suspended accounts, we group them into communities based on their retweet/mention network and analyze different characteristics such as popular tweeters, domains, and hashtags. The results show that suspended and regular communities exhibit significant differences in terms of popular tweeter and hashtags. Our qualitative analysis also shows that suspended communities are heterogeneous in terms of their characteristics. We further find that accounts suspended by Twitter's new countermeasures are tightly connected to the original suspended communities.

References

  1. J. DiGrazia, K. McKelvey, J. Bollen, and F. Rojas, "More tweets, more votes: Social media as a quantitative indicator of political behavior," PLOS ONE, vol. 11, no. 8, 2013.Google ScholarGoogle Scholar
  2. H. T. Le, G. Boynton, Y. Mejova, Z. Shafiq, and P. Srinivasan, "Revisiting The American Voter on Twitter," in ACM Conference on Human Factors in Computing Systems (CHI), 2017.Google ScholarGoogle Scholar
  3. J. Burgess and A. Bruns, "The dynamics of the #ausvotes conversation in relation to the Australian media ecology," Journalism Pratice, vol. 6, pp. 384--402, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  4. N. Anstead, "Social Media Analysis and Public Opinion: The 2010 UK General Election," Journal of Computer-Mediated Communication, pp. 204--220, 2014.Google ScholarGoogle Scholar
  5. S. Ahmed, K. Jaidka, and J. Cho, "The 2014 Indian elections on Twitter: A comparison of campaign strategies of political parties," Telematics and Informatics, vol. 33, pp. 1071--1087, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Duggan and A. Smith, "The Political Environment on Social Media," 2016.Google ScholarGoogle Scholar
  7. E. Shearer, "Candidates social media outpaces their websites and emails as an online campaign news source," 2016.Google ScholarGoogle Scholar
  8. C. Grier, K. Thomas, V. Paxson, and M. Zhang, "@spam: The Underground on 140 Characters or Less," in The ACM Conference on Computer and Communications Security (CCS), 2010.Google ScholarGoogle Scholar
  9. G. Stringhini, C. Kruegel, and G. Vigna, "Detecting Spammers on Social Networks," in Annual Computer Security Applications Conference (ACSAC), 2010.Google ScholarGoogle Scholar
  10. K. Thomas, C. Grier, V. Paxson, and D. Song, "Suspended Accounts in Retrospect: An Analysis of Twitter Spam," in Internet Measurement Conference (IMC), 2011.Google ScholarGoogle Scholar
  11. C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu, "Analyzing Spammers Social Networks for Fun and Profit," in Proceedings of the 20th International Conference Companion on World Wide Web, 2012.Google ScholarGoogle Scholar
  12. J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, S. Patil, A. Flammini, and F. Menczer, "Truthy: Mapping the Spread of Astroturf in Microblog Streams," in Proceedings of the 20th International Conference Companion on World Wide Web (WWW), 2011.Google ScholarGoogle Scholar
  13. D. L. Linvill and P. L. Warren, "Troll Factories: The Internet Research Agency and State-Sponsored Agenda Building," 2018.Google ScholarGoogle Scholar
  14. A. Bessi and E. Ferrara, "Social bots distort the 2016 U.S. Presidential election online discussion," First Monday, 2016.Google ScholarGoogle Scholar
  15. ICA, "Background to "Assessing Russian Activities and Intentions in Recent US Elections": The Analytic Process and Cyber Incident Attribution," https://www.dni.gov/files/documents/ICA_2017_01.pdf, 2017.Google ScholarGoogle Scholar
  16. "The Intelligence Community Assessment: Assessing Russian Activities and Intentions in Recent U.S. Elections," https://www.burr.senate.gov/imo/media/doc/SSCI%20ICA%20ASSESSMENT_FINALJULY3.pdf, 2018.Google ScholarGoogle Scholar
  17. Twitter, "Update on Twitters review of the 2016 US election," https://blog.twitter.com/official/en_us/topics/company/2018/2016-election-update.html, 2018.Google ScholarGoogle Scholar
  18. A. Stamos, "An Update On Information Operations On Facebook," https://newsroom.fb.com/news/2017/09/information-operations-update/, 2017.Google ScholarGoogle Scholar
  19. Y. Roth and D. Harvey, "How Twitter is fighting spam and malicious automation," https://blog.twitter.com/official/en_us/topics/company/2018/how-twitter-is-fighting-spam-and-malicious-automation.html, 2018.Google ScholarGoogle Scholar
  20. A. Stamos, "Authenticity Matters: The IRA Has No Place on Facebook," https://newsroom.fb.com/news/2018/04/authenticity-matters/, 2018.Google ScholarGoogle Scholar
  21. Facebook, "Community Standards Enforcement Preliminary Report," https://transparency.facebook.com/community-standards-enforcement#fake-accounts, 2018.Google ScholarGoogle Scholar
  22. C. Timberg and E. Dwoskin, "Twitter is sweeping out fake accounts like never before, putting user growth at risk," https://wapo.st/2AMDior, 2018.Google ScholarGoogle Scholar
  23. J. Jacobs, "In Twitter Purge, Top Accounts Lose Millions of Followers," https://nyti.ms/2FAHHhf, 2018.Google ScholarGoogle Scholar
  24. S. Zannettou, T. Caulfield, E. D. Cristofaro, M. Sirivianos, G. Stringhini, and J. Blackburn, "Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web," https://arxiv.org/abs/1801.09288, 2018.Google ScholarGoogle Scholar
  25. A. Badawy, E. Ferrara, and K. Lerman, "Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campain," in The 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2018.Google ScholarGoogle Scholar
  26. E. Bursztein and A. Marzuoli, "Quantifying the impact of the Twitter fake accounts purge - a technical analysis," https://bit.ly/2LVum4p, 2018.Google ScholarGoogle Scholar
  27. A. Arif, L. G. Stewart, and K. Starbird, "Acting the Part: Examining Information Operations Within #BlackLivesMatter Discourse," in The 21st ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), 2018.Google ScholarGoogle Scholar
  28. S. Zannettou, T. Caulfield, W. N. Setzer, M. Sirivianos, G. Stringhini, and J. Blackburn, "Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls," https://arxiv.org/pdf/1811.03130.pdf, 2019.Google ScholarGoogle Scholar
  29. D. Harvey and D. Gasca, "Serving healthy conversation," https://blog.twitter.com/official/en_us/topics/product/2018/Serving_Healthy_Conversation.html, 2018.Google ScholarGoogle Scholar
  30. T. Rupar, A. Blake, and S. Granados, "The ever-changing issues of the 2016 campaign, as seen on Twitter. http://wapo.st/1OgbJ45," December 2015.Google ScholarGoogle Scholar
  31. W. Andrews and T. Kaplan, "Where the Candidates Stand on 2016's Biggest Issues. The New York Times," http://nyti.ms/2ERzPEn, 2016.Google ScholarGoogle Scholar
  32. Z. Jin, J. Cao, H. Guo, Y. Zhang, Y. Wang, and J. Luo, "Detection and Analysis of 2016 U.S. Presidential Election Related Rumors on Twitter," https://arxiv.org/abs/1701.06250, 2017.Google ScholarGoogle Scholar
  33. H. Allcott and M. Gentzkow, "Social Media and Fake News in the 2016 Election," January 2017, nBER Working Paper No. 23089.Google ScholarGoogle Scholar
  34. M.-A. Rizoiu, T. Graham, R. Zhang, Y. Zhang, R. Ackland, and L. Xie, "#DebateNight: The Role and Influence of Socialbots on Twitter During the 1st 2016 U.S. Presidential Debate," in Proceedings of the 12th International Conference on Web and Social Media (ICWSM), 2018.Google ScholarGoogle Scholar
  35. P.-C. Lin and P.-M. Huang, "A Study of Effective Features for Detecting Long-surviving Twitter Spam Accounts," in The 15th International Conference on Advanced Communications Technology (ICACT), 2013.Google ScholarGoogle Scholar
  36. S. Lee and J. Kim, "Early filtering of ephemeral malicious accounts on Twitter," Computer Communications, no. 54, pp. 48--57, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. S. Volkova and E. Bell, "Identifying Effective Signals to Predict Deleted and Suspended Accounts on Twitter across languages," in AAAI International Conference on Weblogs and Social Media (ICWSM), 2017.Google ScholarGoogle Scholar
  38. H. T. Le, G. Boynton, Y. Mejova, Z. Shafiq, and P. Srinivasan, "Bumps and Bruises: Mining Presidential Campaign Announcements on Twitter," in ACM Conference on Hypertext and Social Media (HT), 2017.Google ScholarGoogle Scholar
  39. "New Tweets per second record, and how!" https://blog.twitter.com/2013/new-tweets-per-second-record-and-how, August 2013.Google ScholarGoogle Scholar
  40. Q. Cao, X. Yang, J. Yu, and C. Palow, "Uncovering Large Groups of Active Malicious Accounts in Online Social Networks," in The ACM Conference on Computer and Communications Security (CCS), 2014.Google ScholarGoogle Scholar
  41. M. Jiang, P. Cu, A. Beutel, C. Faloutsos, and S. Yang, "CatchSync: Catching Synchronized Behavior in Large Directed Graphs," in ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2014.Google ScholarGoogle Scholar
  42. V. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, "Fast unfolding of communities in large networks," Journal of Statistical Mechanics: Theory and Experiment, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  43. M. Hindman and V. Barash, "Disinformation, 'Fake News' and Influence Campaigns on Twitter," 2018.Google ScholarGoogle Scholar
  44. Twitter, "About Suspended Accounts," https://help.twitter.com/en/managing-your-account/suspended-twitter-accounts, 2018.Google ScholarGoogle Scholar
  45. SenateIntelligenceCommittee, "Exhibit B," https://intelligence.house.gov/uploadedfiles/exhibit_b.pdf, 2017.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ASONAM '19: Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
    August 2019
    1228 pages
    ISBN:9781450368681
    DOI:10.1145/3341161

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 15 January 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    ASONAM '19 Paper Acceptance Rate41of286submissions,14%Overall Acceptance Rate116of549submissions,21%

    Upcoming Conference

    KDD '24

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader