Covert AI Influence Operations Linked to Russia, China, Iran, and Israel, OpenAI Reports

May 30, 2024

OpenAI's report unveils how state-backed actors from Russia, China, Iran, and Israel exploited generative AI tools to carry out covert influence operations aimed at swaying public opinion and geopolitical narratives. The incidents underscore the critical need for trustworthy AI governance. For those interested in shaping safe and secure AI practices, join us in HISPI Project Cerebellum's TAIM initiative (Govern) to help establish guardrails for AI.

Harm prevention and responsible AI require our collective effort. Learn how you can contribute by mapping these incidents in the AI incident database at JOIN US.

Matched TAIM controls

Suggested mapping from embedding similarity (not a formal assessment). Browse all TAIM controls

Alleged deployer
zeno-zeno, spamouflage, russian-government, israeli-government, iranian-government, international-union-of-virtual-media, doppelganger, chinese-government
Alleged developer
openai
Alleged harmed parties
united-states, ukraine, social-media-users, moldova, lithuania, latvia, general-public, estonia, critics-of-the-chinese-government, epistemic-integrity, truth, democracy, electoral-integrity, general-public-of-the-united-states, general-public-of-the-european-union, national-security-and-intelligence-stakeholders

Source

Data from the AI Incident Database (AIID). Cite this incident: https://incidentdatabase.ai/cite/774

Data source

Incident data is from the AI Incident Database (AIID).

When citing the database as a whole, please use:

McGregor, S. (2021) Preventing Repeated Real World AI Failures by Cataloging Incidents: The AI Incident Database. In Proceedings of the Thirty-Third Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-21). Virtual Conference.

Pre-print on arXiv · Database snapshots & citation guide

We use weekly snapshots of the AIID for stable reference. For the official suggested citation of a specific incident, use the “Cite this incident” link on each incident page.