Fake News Generated Against Hong Kong Protesters

Research by the Journalism and Media Studies Center of the Hong Kong University has begun to reveal the disinformation spread on social media the 2019 Hong Kong protests by China where these events are being framed as a separatist movement.

A University of Hong Kong (HKU) team scrutinising images, videos and any information from the ongoing anti-government protests, trying to tell which are real, misleading or fake.

Since August 2019, China’s information operations on Hong Kong protests have been unveiled internationally. This was brought to the light after a number of social media platforms, including Twitter and Facebook, discovered the existence of coordinated network activities by China that were spreading disinformation about Honk Kong protests. Twitter has said that the aim of these operations was to undermine the protest movement’s “legitimacy and political positions.”

As Twitter and Facebook’s reports had not addressed the nature of disinformation in the operation, a research team headed by Professor Fu King-wa of the Journalism and Media Studies Center of the Hong Kong University conducted follow-up research and ran data analysis on content from 640,000 Twitter user accounts which actively posted Hong Kong-related news since June 2019. The research is still ongoing.

The initial analysis shows that about 20 percent of the 640,000 Twitter users were bots and this percentage is much higher than previous research about information operations in other countries. 

For example, the percentage of bots in Russian information operations regarding Ukraine was just about 8 percent according to a research on Russian social media influence published by RAND corporation in 2018. Inside China’s Great Firewall, disinformation spread on social media was mainly aimed at constructing a separatist or “pro-Hong Kong independence” frame for Hong Kong’s anti-extradition movement. Everything related to Hong Kong protests on China’s Weibo was labeled as acts of “pro-Hong Kong independence” by social media news outlets. 

Even the pro-Hong Kong protests comments that are made outside the Great Firewall on Twitter, Facebook and Instagram, once they are spotted by mainland Chinese netizens and reported on Chinese social media platforms.

These individual users could face tremendous pressure, in particular if they have social and business connections with China. Furthermore to ocurrence  violent acts by pro-Beijing elements had been praised on mainland Chinese social media as heroic acts. For example, the Lennon Walls, a public art space which has been set up spontaneously by local residents in many districts for free expression, are labelled “pro-Hong Kong independence” sites and those who have taken action to destroy the walls are depicted as the righteous ones. 

However, “Hong Kong independence” is not even an agenda of the Hong Kong protesters, who have been taking to the streets since March 2019. 

The five demands of the protests are complete withdrawal of the extradition bill, which would authorise Hong Kong to extradite crime suspects to mainland China for trial, independent investigation into police operations, the dropping of all riot charges against the protesters, amnesty for arrested protesters, and universal suffrage to the Legislature and the Chief Executive. 
None of these demands include calls for Hong Kong independence.

The research team will continue to dig further into the data for a more elaborate analysis of China’s information operations in relation to the Hong Kong protests. However, initial findings strongly suggest that the Chinese Communist party and state media apparatus have played a key role in spreading information framing the protests as a “pro-Hong Kong independence” movement. 

Such attempts are intended to mislead China’s public opinion that the discontent is part of a separatist political plot to undermine the “integrity of Chinese territory”, a phrase repeatedly used among mainland Chinese online patriots.

Global Voices:           SCMP

You Might Also Read: 

Police Location App Used By Hong Kong Protesters Deleted:

 

« Cyber Attack On A Nuclear Power Plant
Cyber Crime Is An Increasing Risk For Charities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

Capy

Capy

Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more.

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers is a multinational professional services network of firms headquartered in London, United Kingdom and operating in 157 countries.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Cyber Security Advisor

Cyber Security Advisor

Notice how sophisticated the cybersecurity market is. Think how would you pick the security provider, assess your company, and be sure of your security decisions? Cyber Security Advisor is the answer!

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.