Description: AI tools linked to China were used to disseminate disinformation targeting voters in the U.S. and Taiwan, according to a Microsoft report. These operations included AI-generated imagery and audio to influence political perceptions and election outcomes, originating from the APT Storm-1376 (also known as Spamouflage and Dragonbridge).
Entities
View all entitiesAlleged: Storm-1376 , Spamouflage , Dragonbridge and Chinese Communist Party developed and deployed an AI system, which harmed U.S. voters , Taiwanese voters , General public , Election integrity and Democracy.
Incident Stats
Risk Subdomain
A further 23 subdomains create an accessible and understandable classification of hazards and harms associated with AI
4.1. Disinformation, surveillance, and influence at scale
Risk Domain
The Domain Taxonomy of AI Risks classifies risks into seven AI risk domains: (1) Discrimination & toxicity, (2) Privacy & security, (3) Misinformation, (4) Malicious actors & misuse, (5) Human-computer interaction, (6) Socioeconomic & environmental harms, and (7) AI system safety, failures & limitations.
- Malicious Actors & Misuse
Entity
Which, if any, entity is presented as the main cause of the risk
Human
Timing
The stage in the AI lifecycle at which the risk is presented as occurring
Post-deployment
Intent
Whether the risk is presented as occurring as an expected or unexpected outcome from pursuing a goal
Intentional
Incident Reports
Reports Timeline
SAN FRANCISCO---Online actors linked to the Chinese government are increasingly leveraging artificial intelligence to target voters in the U.S., Taiwan and elsewhere with disinformation, according to new cybersecurity research and U.S. offi…

America’s adversaries did not significantly affect the results of the 2024 U.S. elections — but not for lack of trying. Russia, Iran, and China waged aggressive influence operations targeting America’s political system, but America proved r…
Variants
A "variant" is an incident that shares the same causative factors, produces similar harms, and involves the same intelligent systems as a known AI incident. Rather than index variants as entirely separate incidents, we list variations of incidents under the first similar incident submitted to the database. Unlike other submission types to the incident database, variants are not required to have reporting in evidence external to the Incident Database. Learn more from the research paper.