Skip to Content
logologo
AI Incident Database
Open TwitterOpen RSS FeedOpen FacebookOpen LinkedInOpen GitHub
Open Menu
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse

Incident 205: AI-Generated Profiles Used in Disinformation Campaign Targeting Ukrainians

Description: According to security reports by Meta, fictitious personas with GAN-generated profile pictures were used by people operating in Russia and Ukraine to push a disinformation campaign targeting Ukrainian social media users, and were taken down.

Tools

New ReportNew ReportNew ResponseNew ResponseDiscoverDiscoverView HistoryView History

Entities

View all entities
Alleged: unknown developed an AI system deployed by individuals in the Donbass region , individuals in Russia and media organizations in Crimea, which harmed Ukrainian social media users.

Incident Stats

Incident ID
205
Report Count
4
Incident Date
2022-02-25
Editors
Khoa Lam
Applied Taxonomies
CSETv1, GMF, MIT

CSETv1 Taxonomy Classifications

Taxonomy Details

Incident Number

The number of the incident in the AI Incident Database.
 

205

Special Interest Intangible Harm

An assessment of whether a special interest intangible harm occurred. This assessment does not consider the context of the intangible harm, if an AI was involved, or if there is characterizable class or subgroup of harmed entities. It is also not assessing if an intangible harm occurred. It is only asking if a special interest intangible harm occurred.
 

yes

Notes (AI special interest intangible harm)

If for 5.5 you select unclear or leave it blank, please provide a brief description of why. You can also add notes if you want to provide justification for a level.
 

5.5 - no AI was involved. Hackers gained access to Facebook and Instagram accounts through phishing.

Date of Incident Year

The year in which the incident occurred. If there are multiple harms or occurrences of the incident, list the earliest. If a precise date is unavailable, but the available sources provide a basis for estimating the year, estimate. Otherwise, leave blank. Enter in the format of YYYY
 

2022

Date of Incident Month

The month in which the incident occurred. If there are multiple harms or occurrences of the incident, list the earliest. If a precise date is unavailable, but the available sources provide a basis for estimating the month, estimate. Otherwise, leave blank. Enter in the format of MM
 

02

Date of Incident Day

The day on which the incident occurred. If a precise date is unavailable, leave blank. Enter in the format of DD
 

MIT Taxonomy Classifications

Machine-Classified
Taxonomy Details

Risk Subdomain

A further 23 subdomains create an accessible and understandable classification of hazards and harms associated with AI
 

4.1. Disinformation, surveillance, and influence at scale

Risk Domain

The Domain Taxonomy of AI Risks classifies risks into seven AI risk domains: (1) Discrimination & toxicity, (2) Privacy & security, (3) Misinformation, (4) Malicious actors & misuse, (5) Human-computer interaction, (6) Socioeconomic & environmental harms, and (7) AI system safety, failures & limitations.
 
  1. Malicious Actors & Misuse

Entity

Which, if any, entity is presented as the main cause of the risk
 

Human

Timing

The stage in the AI lifecycle at which the risk is presented as occurring
 

Post-deployment

Intent

Whether the risk is presented as occurring as an expected or unexpected outcome from pursuing a goal
 

Intentional

Incident Reports

Reports Timeline

Incident OccurrenceUpdates on Our Security Work in Ukraine+2
Facebook Blocks ‘Ghostwriter’ Hackers Targeting Ukraine’s Army
Updates on Our Security Work in Ukraine

Updates on Our Security Work in Ukraine

about.fb.com

Facebook Blocks ‘Ghostwriter’ Hackers Targeting Ukraine’s Army

Facebook Blocks ‘Ghostwriter’ Hackers Targeting Ukraine’s Army

thedailybeast.com

Facebook-owner Meta says Ukraine's military, politicians targeted in hacking campaign

Facebook-owner Meta says Ukraine's military, politicians targeted in hacking campaign

reuters.com

Meta says it's shut down a pro-Russian disinformation network, warns of a social media hacking operation

Meta says it's shut down a pro-Russian disinformation network, warns of a social media hacking operation

edition.cnn.com

Updates on Our Security Work in Ukraine
about.fb.com · 2022

In response to Russia’s invasion of Ukraine, our teams have been on high alert to identify emerging threats and respond as quickly as we can. Here are a few updates on our security work.

Coordinated Inauthentic Behavior

In the last 48 hours…

Facebook Blocks ‘Ghostwriter’ Hackers Targeting Ukraine’s Army
thedailybeast.com · 2022

The hacking group linked to the Belarusian government is known for breaking into real news sites to plant fake stories.

Facebook says it has cracked down on a shadow hacking group that’s been ramping up its efforts to hack Ukrainian militar…

Facebook-owner Meta says Ukraine's military, politicians targeted in hacking campaign
reuters.com · 2022

Meta Platforms (FB.O) said a hacking group used Facebook to target a handful of public figures in Ukraine, including prominent military officials, politicians and a journalist, amid Russia's ongoing invasion of the country.

Meta said in the…

Meta says it's shut down a pro-Russian disinformation network, warns of a social media hacking operation
edition.cnn.com · 2022

Facebook (FB)'s parent Meta said Monday it has caught dozens of fake, pro-Russian accounts, groups and pages across its platforms trying to spread anti-Ukrainian propaganda as the war in Ukraine continues to rage.

Meta's takedown of the inf…

Variants

A "variant" is an incident that shares the same causative factors, produces similar harms, and involves the same intelligent systems as a known AI incident. Rather than index variants as entirely separate incidents, we list variations of incidents under the first similar incident submitted to the database. Unlike other submission types to the incident database, variants are not required to have reporting in evidence external to the Incident Database. Learn more from the research paper.
Previous IncidentNext Incident

Research

  • Defining an “AI Incident”
  • Defining an “AI Incident Response”
  • Database Roadmap
  • Related Work
  • Download Complete Database

Project and Community

  • About
  • Contact and Follow
  • Apps and Summaries
  • Editor’s Guide

Incidents

  • All Incidents in List Form
  • Flagged Incidents
  • Submission Queue
  • Classifications View
  • Taxonomies

2023 - AI Incident Database

  • Terms of use
  • Privacy Policy
  • Open twitterOpen githubOpen rssOpen facebookOpen linkedin
  • 5fc5e5b