CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 14, 2026

War Game Exercise Demonstrates How Social Media Manipulation Works

Dark Reading Archived Apr 14, 2026 ✓ Full text saved

In an educational game called "Capture the Narrative," students created bots to sway a fictional election, simulating influence in real-world political scenarios.

Full text archived locally
✦ AI Summary · Claude Sonnet


    CYBER RISK ENDPOINT SECURITY REMOTE WORKFORCE APPLICATION SECURITY NEWS War Game Exercise Demonstrates How Social Media Manipulation Works In an educational game called "Capture the Narrative," students created bots to sway a fictional election, simulating influence in real-world political scenarios. Elizabeth Montalbano,Contributing Writer April 14, 2026 5 Min Read SOURCE: TCD/PROD.DB VIA ALAMY STOCK PHOTO The 1983 film "WarGames" demonstrated how a teenage hacker could bring the world to the brink of nuclear war by thinking he was playing a game while actually manipulating military systems in real time. These days, however, manipulation of world events via malicious activity is often a game of technology-driven online influence rather than actual physical weapons, though the stakes can be equally as high. To explore how this manipulation via social media potentially can sway real-world events, a university in Australia had an idea: Stage a multiplayer war game that uses artificial intelligence (AI)-driven bots to manipulate content while engaging with users on social media to see how far the pendulum of "public" opinion can swing through online interaction alone.  Called "Capture the Narrative" and hosted by the University of New South Wales (UNSW) in Sydney, more than 270 participants from 18 universities throughout Australia spent a four-week period last year trying to manipulate an in-house social media platform called Legit Social. The goal of the game was to turn a simulated election in a fictional island in the South Pacific called "Kingston" in favor of one political candidate over another, with players creating bots aiming to promote content to favor one or the other. Related:Threat Actors Get Crafty With Emojis to Escape Detection The ultimate goal of creating such a competition — the work of Hammond Pearce and Rahat Masood, senior lecturers in the UNSW School of Computer Science — was to create an effective "cybersecurity capture-the-flag educational game" for computer science students that focused on social influence rather than traditional coding practices, Pearce tells Dark Reading.  "I wanted to have a platform where students could learn about AI misinformation online by interacting with, generating, and attempting to detect such influence," he says. Pearce will host a session at Black Hat Asia 2026 to discuss the outcome of the game, the lessons it has for how AI-generated fake content on social media can exert influence in the public space, and what technology stakeholders can do about it. Fake Election, Real-World Inspiration  The result of the competition — which ended up shifting the vote 1.8 percentage points, enough to change the simulated election outcome — has relevance for technology industry as well, particularly those companies that control the content being disseminated via social media, Pearce says. In fact, he says the game's creators were inspired by real-world instances of AI bots attempting to exert election or policy influence. One was a case of attempted election interference in Australia, where there was evidence that a pro-Russia operation attempted to poison AI chatbots with propaganda ahead of the 2025 federal election.  Related:Lies, Damned Lies, and Cybersecurity Metrics Another online campaign that influenced Pearce and Masood was one in which bots associated with the People's Republic of China (PRC) tried to sway the narrative around Australia's Voice referendum, a constitutional referendum in 2023 that aimed to give more political rights to indigenous people in the country, Pearce says. People in the US are no strangers to such online influence by external forces as well. The specter of the Russian online misinformation campaign designed to influence the 2020 presidential election still looms large over any major US election cycle. And with the rapid growth and proliferation of AI in the past few years, malicious actors have more tools at their disposal than ever to manipulate social media platform and influence public opinion. Custom Technology for Wargame The UNSW team created various custom technologies for Capture the Narrative, including the in-house social media platform Legit Social as well as "non-player character" (NPC) bots that consumed the social media feed. Related:Shadow AI in Healthcare Is Here to Stay Legit Social "was based on our experiences with the early years of Twitter [now known as X]," Pearce says. "It supports posting, reposting, replying, liking, tagging, embedding media and GIFS, and more."  The team used a Python back end and React front end for the platform, which also has a trending algorithm and a chronological feed, he says. The NPC bots, meanwhile, were developed with a custom Python framework to have more than 40 attributes defining their personality and beliefs, which could evolve over time. These "simulated citizens" using social media — which competitors were to persuade building their own bots, or "player characters" (PCs) — were powered by a network of 12 large language model (LLM) instances running concurrently, Pearce says. "The goal of the game is for the human players to build PC bots which persuade the NPC bots to change their voting intention in the simulated election," he says.  Lessons and Surprises Even as the players succeeded in achieving the goals of the game, they also developed technology applicable outside of the game scenario that demonstrates potential influence tactics for the real world, Pearce says.  These included the building of advanced AI bot systems for dynamic and adaptive spam; mass content scanning for sentiment analysis and identifying specific accounts to micro-target; and building closed-loop systems that continually adapt content and tone for maximum engagement, he tells Dark Reading. "The teams, when surveyed, provided interesting insights regarding the AI content and how they found they could see similar patterns in real social media," he says. The game also delivered a surprise in the quality and scale of the content generated by the teams on their budget, which was AU$0 to AU$100. "Between the millions of dynamic posts and the mass content scanning, we had multiple instances where our servers crashed under the load," Pearce acknowledges. All in all, the competition and its outcome not only provided a valuable tool for professors and students, but also can provide insight for technology providers, lawmakers, and other stakeholders for future AI and social media development, he says. One of those is that the gatekeepers of social media platforms "need to do more to ensure that AI-generated fake content designed to persuade and confuse is identified and removed at scale," Pearce says.  At the same time, everyone using the Internet has a responsibility to educate themselves on "how easy it is for such content to be generated and propagated autonomously and at scale," Pearce says, adding that the public sector should be actively involved in promoting and supporting this education for the good of all. Black Hat Asia APR 21, 2026 TO APR 24, 2026 | SINGAPORE Black Hat Asia returns to Marina Bay Sands in Singapore with a four-day program featuring specialized cybersecurity trainings with courses for all skill levels, a Summit Day, and the two-day main conference. Black Hat Asia 2026 will feature Briefings by experts from around the world presenting the latest research in cybersecurity risks, developments and trends, dozens of open-source tool demos in Arsenal, a robust Business Hall, networking opportunities, social events, and much more. Use code: DARKREADING to get a Free Business pass or save $200 on a Briefings pass. GET YOUR PASS Read more about: Black Hat News About the Author Elizabeth Montalbano Contributing Writer Elizabeth Montalbano is a freelance writer, journalist, and therapeutic writing mentor with more than 25 years of professional experience. Her areas of expertise include technology, business, and culture. Elizabeth previously lived and worked as a full-time journalist in Phoenix, San Francisco, and New York City; she currently resides in a village on the southwest coast of Portugal. In her free time, she enjoys surfing, hiking with her dogs, traveling, playing music, yoga, and cooking. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications KuppingerCole Business Application Risk Management Leadership Compass 2026 CISO AI Risk Report QKS AI Maturity Matrix Access More Research Webinars Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning Zero Trust Architecture for Cloud environments: Implementation Roadmap Tips for Managing Cloud Security in a Hybrid Environment? Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up More Webinars You May Also Like CYBER RISK Switching to Offense: US Makes Cyber Strategy Changes by Robert Lemos, Contributing Writer NOV 21, 2025 CYBER RISK Microsoft Exchange 'Under Imminent Threat,' Act Now by Arielle Waldman NOV 12, 2025 CYBER RISK SecurityScorecard Buys AI Automation Capabilities, Boosts Vendor Risk Management by Fahmida Y. Rashid SEP 15, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 THREAT INTELLIGENCE Axios Attack Shows How Complex Social Engineering Is Industrialized byAlexander Culafi APR 6, 2026 5 MIN READ ICS/OT SECURITY Iranian Threat Actors Disrupt US Critical Infrastructure via Exposed PLCs byElizabeth Montalbano APR 8, 2026 4 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection LOADING... Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning MON, MAY 11, 2026 AT 1:00PM ET Tips for Managing Cloud Security in a Hybrid Environment? THURS, MAY 7, 2026 AT 1PM EST Zero Trust Architecture for Cloud environments: Implementation Roadmap TUES, MAY 12, 2026 AT 1PM EST Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 14, 2026
    Archived
    Apr 14, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗