Organised Social Media Manipulation

Propaganda has always been part of political discourse going back through publishing history and was one of the main reasons why governments allowed newspapers to operate in their country. But now, with the expansion and subtle manipulation of information, fake-news and propaganda, this data misuse has significantly increased and is raising public concern. 

A new Report written by the Oxford University’s Internet Institute called The Global Disinformation Order has recently been published. 

This excellent Report goes into depth about the increasing global data and information propaganda that is taking place but governments across the globe.The use of computational propaganda to shape public attitudes via social media has become mainstream, extending far beyond the actions of a few bad actors. 

In an information environment characterised by high volumes of information and limited levels of user attention and trust, the tools and techniques of computational propaganda are becoming a common and arguably an essential part of digital campaigning and public diplomacy. 

While many countries have seen an increase in computational propaganda on social media, attribution back to a particular actor remains difficult. 

One important feature of the organisation of manipulation campaigns is that cyber troops often work in conjunction with private industry, civil society organisations, Internet sub-cultures, youth groups, hacker collectives, fringe movements, social media influencers, and volunteers who ideologically support their cause. 

The distinction between these groups can often be difficult to draw, especially since activities can be implicitly and explicitly sanctioned by the state. Evidence of organised social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017.

In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda is being used as a tool of information control in three distinct ways: to suppress fundamental human rights, discredit political opponents, and drown out dissenting opinions. 

A handful of sophisticated state actors use computational propaganda for foreign influence operations. Facebook and Twitter attributed foreign influence operations to seven countries (China, India, Iran, Pakistan, Russia, Saudi Arabia, and Venezuela) who have used these platforms to influence global audiences.

Facebook remains the platform of choice for social media manipulation. In 56 countries, the Oxford researchers found evidence of formally organised computational propaganda campaigns on Facebook

China has become a major player in the global disinformation order. Until the 2019 protests in Hong Kong, most evidence of Chinese computational propaganda occurred on domestic platforms such as Weibo, WeChat, and QQ. But China’s new-found interest in aggressively using Facebook, Twitter, and YouTube should raise concerns for democracies.
Computational propaganda has become a normal part of the digital public sphere. These techniques will also continue to evolve as new technologies, including Artificial Intelligence, Virtual Reality, or the Internet of Things, are poised to fundamentally reshape society and politics. 

But since computational propaganda is a symptom of long-standing challenges to democracy, it is important that solutions take into consideration these systemic challenges. 

It must also consider the role social media platforms have played in shaping the current information environment. A strong democracy requires access to high-quality information and an ability for citizens to come together to debate, discuss, deliberate, empathise, and make concessions. 

Oxford Internet Institute:

You Might Also Read:

Social Media Is The New Gutenberg:

 

« Huawei Will Sell Its 5G Know-How
Rogue States Are Funding Stateless Hackers »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

QNAP Systems

QNAP Systems

QNAP Systems, Inc. delivers world class network attached storage (NAS) and network video recorder (NVR) solutions.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.

Scalefusion

Scalefusion

Scalefusion provides a comprehensive suite of products engineered to simplify endpoint, user, and access management for IT teams.

LabEx

LabEx

LabEx is an AI-Powered learning platform with labs spanning from Linux devops to web development and cybersecurity.