Twitter bomb

Last updated

The term twitter bomb or tweet bomb (also spelled as one word) refers to posting numerous (pejoratively, "spamming") Tweets with the same hashtags and other similar content, including @messages, from multiple accounts, with the goal of advertising a certain meme, usually by filling people's Tweet feeds with the same message, and making it a "trending topic" on X (formerly Twitter). [1] [2] [3] This may be done by individual users, fake accounts, or both. [4]

Contents

Advertising

Twitter bombing may be used for commercial advertising. An early example from April 2005 referred to advertising a YouTube video series Ask a Ninja. [2]

Politics

Twitter bombing is one of the tools used in Internet activism, both by mainstream politicians like Barack Obama and by groups like Anonymous. [1] [5] [6]

The earliest recorded usage of the Twitter bomb is from August 2008, when it was used by bloggers Liza Sabater and Kenneth Quinnell in response to Republican use of the #dontgo hashtag relating to offshore oil drilling. [7] The term was used for other purposes in 2008, but the other meanings have since disappeared. [2]

An example of a Twitter bomb was the campaign organized by online activists in response to a July 31, 2009 Washington Post article on Hillary Clinton that was deemed sexist. [8]

In 2011, it was used extensively by Barack Obama's campaign staff to encourage his followers to contact Congress and encourage them to reach a compromise during the United States debt-ceiling crisis of 2011. Shortly thereafter, @BarackObama lost about 37,000 followers. [4]

Positive impacts

Twitter bombing/spamming can provide exposure to current events that are not being exposed enough from mainstream media. Dhiraj Murthy writes:

Twitter has received significant media attention in its use to disseminate information during disasters, including the 2008 Mumbai bomb blasts (Dolnick, 2005) and the January 2005 crash of US Airways flight 1549 (Beaumont, 2009). [9]

Linking this with the use of hashtag, see hashtag activism, news and information can be spread around the internet at a rapid pace with the use of hashtags.

Comparison to online spam

The use of the Twitter bomb tactics has been known to misfire, as people might be offended by spamming, or trolling. [2] [10]

Spammers have several goals, which are phishing, advertising, or malware distribution. Unlike traditional online spamming, such as email, Twitter has a limit of only 280 characters per tweet. Therefore, a Twitter bomb often include URLs in their tweets in order to send others users to their malicious pages online. [11]

Unlike email spam, Twitter bombs may require participation from their targeted users. Fake accounts are a common source of Twitter bombs. In order to avoid Twitter's spam filters and to overcome their lack of followers, Twitter bombs are often sent as a reply to existing tweets about the same topic. This is done in hopes that the authors of the existing tweets will retweet the response to their own followers, spreading the Twitter bomb before the fake account is deleted. [12]

With regards to numbers, an example of a Twitter bomb analyzed in one research paper described how nine fake user accounts produced 929 tweets in 138 minutes, all with a URL to a political website, presenting negative views on the U.S. politician Martha Coakley. [12] The message might have reached about 60,000 before being eliminated by Twitter as spam. [13]

Criticism

Many Twitter users find comfort in sharing their ideas and thoughts to the general public. Though Twitter can be utilized to spread awareness of a variety of issues and causes, many can take advantage and post numerous tweets that may be viewed as spam. Twitter's rule page considers tweets "spam" once a user displays multiple tweets with unrelated hashtags to a certain topic, or continues to post multiple tweets of the same content in one account. Some instances, these tweets can be viewed as trolling once they begin to seek out other Twitter users for arguments about controversial issues.

See also

Related Research Articles

<span class="mw-page-title-main">Spamming</span> Unsolicited electronic messages, especially advertisements

Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose, or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps, television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.

<span class="mw-page-title-main">Twitter</span> American social networking service

X, commonly referred to by its former name Twitter, is a social media website based in the United States. With over 500 million users, it is one of the world's largest social networks and the fifth-most visited website in the world. Users can share text messages, images, and videos as "posts", commonly still known as "tweets". X also includes direct messaging, video and audio calling, bookmarks, lists and communities, and Spaces, a social audio feature. Users can vote on context added by approved users using the Community Notes feature.

<span class="mw-page-title-main">Hashtag</span> Metadata tag prefixed with #

A hashtag is a metadata tag that is prefaced by the hash symbol, #. On social media, hashtags are used on microblogging and photo-sharing services such as X or Tumblr as a form of user-generated tagging that enables cross-referencing of content by topic or theme. It is still sometimes known as the pound sign. For example, a search within Instagram for the hashtag #bluesky returns all posts that have been tagged with that term. After the initial hash symbol, a hashtag may include letters, numerals, or underscores.

<span class="mw-page-title-main">Social media marketing</span> Promotion of products or services on social media

Social media marketing is the use of social media platforms and websites to promote a product or service. Although the terms e-marketing and digital marketing are still dominant in academia, social media marketing is becoming more popular for both practitioners and researchers. Most social media platforms have built-in data analytics tools, enabling companies to track the progress, success, and engagement of social media marketing campaigns. Companies address a range of stakeholders through social media marketing, including current and potential customers, current and potential employees, journalists, bloggers, and the general public. On a strategic level, social media marketing includes the management of a marketing campaign, governance, setting the scope and the establishment of a firm's desired social media "culture" and "tone".

Since the launch of Twitter on July 15, 2006, there have been many notable uses for the service in a variety of environments, including political, economic, social and cultural uses. As users post their messages on Twitter they encourage other people to respond and engage in online discussions as well as offline activities. User engagement on Twitter is usually measured with likes, replies and retweets and is a form of social power.

<span class="mw-page-title-main">Weibo</span> Chinese microblogging website

Weibo, previously Sina Weibo, is a Chinese microblogging (weibo) website. Launched by Sina Corporation on 14 August 2009, it is one of the biggest social media platforms in China, with over 582 million monthly active users as of Q1 2022. The platform has been a huge financial success, with surging stocks, lucrative advertising sales and high revenue and total earnings per quarter. At the start of 2018, it surpassed the US$30 billion market valuation mark for the first time.

<span class="mw-page-title-main">Instagram</span> Social media platform owned by Meta Platforms

Instagram is a photo and video sharing social networking service owned by Meta Platforms. It allows users to upload media that can be edited with filters, be organized by hashtags, and be associated with a location via geographical tagging. Posts can be shared publicly or with preapproved followers. Users can browse other users' content by tags and locations, view trending content, like photos, and follow other users to add their content to a personal feed. A Meta-operated image-centric social media platform, it is available on iOS, Android, Windows 10, and the web. Users can take photos and edit them using built-in filters and other tools, then share them on other social media platforms like Facebook. It supports 32 languages including English, Spanish, French, Korean, and Japanese.

Shadow banning, also called stealth banning, hellbanning, ghost banning, and comment ghosting, is the practice of blocking or partially blocking a user or the user's content from some areas of an online community in such a way that the ban is not readily apparent to the user, regardless of whether the action is taken by an individual or an algorithm. For example, shadow-banned comments posted to a blog or media website would be visible to the sender, but not to other users accessing the site.

Social spam is unwanted spam content appearing on social networking services, social bookmarking sites, and any website with user-generated content. It can be manifested in many ways, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.

Horse_ebooks Spam Twitter account and accompanying Internet memes

Horse_ebooks was a widely followed Twitter account and Internet phenomenon. Registered in 2010, the account was apparently intended to promote e-books but became known for its amusing non sequiturs in what seemed to be an effort to evade spam detection.

<span class="mw-page-title-main">Social media use by Barack Obama</span>

Barack Obama won the 2008 United States presidential election on November 4, 2008. During his campaign, he became the first presidential candidate of a major party to utilize social networking sites, as podcasting, Twitter, Myspace, Facebook, and YouTube, to expand and engage his audience of supporters and donors.

An X bot, formerly known as Twitter bot, is a type of software bot that controls an X account via the X API. The social bot software may autonomously perform actions such as posting, reposting, liking, following, unfollowing, or direct messaging other accounts. The automation of X accounts is governed by a set of automation rules that outline proper and improper uses of automation. Proper usage includes broadcasting helpful information, automatically generating interesting or creative content, and automatically replying to users via direct message. Improper usage includes circumventing API rate limits, violating user privacy, spamming, and sockpuppeting. Twitter bots may be part of a larger botnet. They can be used to influence elections and in misinformation campaigns.

<span class="mw-page-title-main">Use of Twitter by public figures</span>

Twitter usage by public figures includes the posting and content-sharing by celebrity and politician users on Twitter.

<span class="mw-page-title-main">Syrian Electronic Army</span> Hacker group affiliated with the Syrian government

The Syrian Electronic Army is a group of computer hackers which first surfaced online in 2011 to support the government of Syrian President Bashar al-Assad. Using spamming, website defacement, malware, phishing, and denial-of-service attacks, it has targeted terrorist organizations, political opposition groups, western news outlets, human rights groups and websites that are seemingly neutral to the Syrian conflict. It has also hacked government websites in the Middle East and Europe, as well as US defense contractors. As of 2011, the SEA has been "the first Arab country to have a public Internet Army hosted on its national networks to openly launch cyber attacks on its enemies".

<span class="mw-page-title-main">Twitter diplomacy</span> Use of X (formerly Twitter) by diplomats

Twitter diplomacy, or Twiplomacy, is a form of digital diplomacy, refers to the practice of conducting public diplomacy using the social media platform X by heads of state and diplomats, as well as leaders of intergovernmental organizations (IGOs).

Hashtag activism refers to the use of Twitter's hashtags for Internet activism. The hashtag has become one of the many ways that social media contributes to civic engagement and social movements. The use of the hashtag on social media provides users with an opportunity to share information and opinions about social issues in a way that others (followers) can interact and engage as part of a larger conversation with the potential to create change. The hashtag itself consists of a word or phrase that is connected to a social or political issue, and fosters a place where discourse can occur. Social media provides an important platform for historically marginalized populations. Through the use of hashtags these groups are able to communicate, mobilize, and advocate for issues less visible to the mainstream.

Social media and political communication in the United States refers to how political institutions, politicians, private entities, and the general public use social media platforms to communicate and interact in the United States.

A social bot, also described as a social AI or social algorithm, is a software agent that communicates autonomously on social media. The messages it distributes can be simple and operate in groups and various configurations with partial human control (hybrid) via algorithm. Social bots can also use artificial intelligence and machine learning to express messages in more natural human dialogue.

<span class="mw-page-title-main">2017 Macron e-mail leaks</span> Release of 21,075 emails associated with the French presidential campaign of Emmanuel Macron

The 2017 Macron e-mail leaks were leaks of more than 20,000 e-mails related to the campaign of Emmanuel Macron during the 2017 French presidential elections, two days before the final vote. The leaks garnered an abundance of media attention due to how quickly news of the leak spread throughout the Internet, aided in large part by bots and spammers and drew accusations that the government of Russia under Vladimir Putin was responsible. The e-mails were shared by WikiLeaks and several American alt-right activists through social media sites like Twitter, Facebook, and 4chan.

References

  1. 1 2 Mary C. Joyce (30 April 2010). Digital Activism Decoded: The New Mechanics of Change. IDEA. p. 221. ISBN   978-1-932716-60-3 . Retrieved 30 April 2012.
  2. 1 2 3 4 Ethan Zuckerman, "The Tweetbomb and the Ethics of Attention", April 20, 2012, Last accessed on April 30, 2012.
  3. J. Ratkiewicz, M. D. Conover, M. Meiss, B. Gonçalves, A. Flammini, F. Menczer, "Detecting and Tracking Political Abuse in Social Media", Proc. 5th International AAAI Conference on Weblogs and Social Media ICWSM (2011).
  4. 1 2 "37K Followers Ditch Obama After Twitter Bomb - @BarackObama tweets handles of GOP legislators, state by state". Newser. 30 July 2011. Retrieved 2012-04-30.
  5. John Clifford Green; Daniel J. Coffey (1 September 2010). The State of the Parties: The Changing Role of Contemporary American Parties. Rowman & Littlefield. p. 178. ISBN   978-0-7425-9954-3 . Retrieved 30 April 2012.
  6. Chris Richardson (2012-04-20). "Anonymous Plans "24 Hour Tweet Bomb" To Fight CISPA". WebProNews. Retrieved 2012-04-30.
  7. Kenneth Quinnell, "Twitter Bomb", Florida Speaks blog, August 5, 2008, Last accessed on August 27, 2012.
  8. Mary C. Joyce (30 April 2010). Digital Activism Decoded: The New Mechanics of Change. IDEA. pp. 155–156. ISBN   978-1-932716-60-3 . Retrieved 30 April 2012.
  9. Murthy, Dhiraj. "Twitter: Microphone for the masses?." Media, Culture & Society 33.5 (2011): 779.
  10. "Social Media Activism and the (In)justice of the Mob". Partisans. 2012-04-26. Archived from the original on 2012-05-06. Retrieved 2012-04-30.
  11. Song, Jonghyuk, Sangho Lee, and Jong Kim."Spam filtering in twitter using sender-receiver relationship." Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2011.
  12. 1 2 P. Metaxas, E. Mustafaraj, "From Obscurity to Prominence in Minutes: Political Speech and Real-Time Search", In: Proceedings of the WebSci10: Extending the Frontiers of Society On-Line, April 26-27th, 2010, Raleigh, NC: US (2010).
  13. Neil Savage. 2011. "Twitter as Medium and Message", Communications of the ACM 54, no. 3 (March 2011), 18–20. DOI:10.1145/1897852.1897860