Organised Social Media Manipulation

Propaganda has always been part of political discourse going back through publishing history and was one of the main reasons why governments allowed newspapers to operate in their country. But now, with the expansion and subtle manipulation of information, fake-news and propaganda, this data misuse has significantly increased and is raising public concern. 

A new Report written by the Oxford University’s Internet Institute called The Global Disinformation Order has recently been published. 

This excellent Report goes into depth about the increasing global data and information propaganda that is taking place but governments across the globe.The use of computational propaganda to shape public attitudes via social media has become mainstream, extending far beyond the actions of a few bad actors. 

In an information environment characterised by high volumes of information and limited levels of user attention and trust, the tools and techniques of computational propaganda are becoming a common and arguably an essential part of digital campaigning and public diplomacy. 

While many countries have seen an increase in computational propaganda on social media, attribution back to a particular actor remains difficult. 

One important feature of the organisation of manipulation campaigns is that cyber troops often work in conjunction with private industry, civil society organisations, Internet sub-cultures, youth groups, hacker collectives, fringe movements, social media influencers, and volunteers who ideologically support their cause. 

The distinction between these groups can often be difficult to draw, especially since activities can be implicitly and explicitly sanctioned by the state. Evidence of organised social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017.

In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda is being used as a tool of information control in three distinct ways: to suppress fundamental human rights, discredit political opponents, and drown out dissenting opinions. 

A handful of sophisticated state actors use computational propaganda for foreign influence operations. Facebook and Twitter attributed foreign influence operations to seven countries (China, India, Iran, Pakistan, Russia, Saudi Arabia, and Venezuela) who have used these platforms to influence global audiences.

Facebook remains the platform of choice for social media manipulation. In 56 countries, the Oxford researchers found evidence of formally organised computational propaganda campaigns on Facebook

China has become a major player in the global disinformation order. Until the 2019 protests in Hong Kong, most evidence of Chinese computational propaganda occurred on domestic platforms such as Weibo, WeChat, and QQ. But China’s new-found interest in aggressively using Facebook, Twitter, and YouTube should raise concerns for democracies.
Computational propaganda has become a normal part of the digital public sphere. These techniques will also continue to evolve as new technologies, including Artificial Intelligence, Virtual Reality, or the Internet of Things, are poised to fundamentally reshape society and politics. 

But since computational propaganda is a symptom of long-standing challenges to democracy, it is important that solutions take into consideration these systemic challenges. 

It must also consider the role social media platforms have played in shaping the current information environment. A strong democracy requires access to high-quality information and an ability for citizens to come together to debate, discuss, deliberate, empathise, and make concessions. 

Oxford Internet Institute:

You Might Also Read:

Social Media Is The New Gutenberg:

 

« Huawei Will Sell Its 5G Know-How
Rogue States Are Funding Stateless Hackers »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

Verlingue

Verlingue

Verlingue (formerly ICB Group) is a leading corporate insurance broker providing Insurance, Risk Management and related advice to businesses and private clients.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Sky Republic

Sky Republic

Sky Republic offers a Smart Contract Platform to integrate and synchronize business networks beyond EDI and API.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Plex IT

Plex IT

Plex IT provides managed IT services to organisations along with managed security services.

Defimoon

Defimoon

DeFimoon is the International Blockchain Development & Security Agency. We provide professional services and solutions at the highest quality on world-leading chains.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

DigitalXForce

DigitalXForce

DigitalXForce is the Digital Trust Platform for the New Era – SaaS based solution that provides Automated, Continuous, Real Time Security & Privacy Risk Management.

Black Cipher Security

Black Cipher Security

Black Cipher is a New Jersey-based cybersecurity and incident response consulting firm.

CirrusHQ

CirrusHQ

CirrusHQ are a Specialist AWS Advanced Consulting Partner with a focus on Cloud Management, DevOps, Migration and Consulting Services for the private and public sectors.

ecfirst

ecfirst

ecfirst's mission is to establish AI platforms and service capabilities to assess and manage client compliance with global mandates on a continual basis to secure business data and assets.