Back to the MIT repository
4. Malicious Actors & Misuse2 - Post-deployment

Sockpuppeting

Create synthetic online personas or accounts

Source: MIT AI Risk Repositorymit1252

ENTITY

1 - Human

INTENT

1 - Intentional

TIMING

2 - Post-deployment

Risk ID

mit1252

Domain lineage

4. Malicious Actors & Misuse

223 mapped risks

4.1 > Disinformation, surveillance, and influence at scale

Mitigation strategy

1. Implement layered identity verification protocols, including multi-factor authentication and advanced biometric liveness checks leveraging motion and texture analysis, to ensure synthetic personas are verifiably tied to unique, live individuals. 2. Deploy specialized automated behavioral and semantic analytics tools to identify clusters of accounts exhibiting non-human-like or highly similar activity patterns, such as shared device identifiers, coincident login hours, or high edit similarity, which are indicative of a single puppet master. 3. Integrate a human-led sanctions and investigation regime with automated content provenance techniques, such as robust watermarking and detection tools, to trace the origin of synthetic content and enforce anti-circumvention policies across all accounts used by an individual.