Organised Social Media Manipulation

Propaganda has always been part of political discourse going back through publishing history and was one of the main reasons why governments allowed newspapers to operate in their country. But now, with the expansion and subtle manipulation of information, fake-news and propaganda, this data misuse has significantly increased and is raising public concern. 

A new Report written by the Oxford University’s Internet Institute called The Global Disinformation Order has recently been published. 

This excellent Report goes into depth about the increasing global data and information propaganda that is taking place but governments across the globe.The use of computational propaganda to shape public attitudes via social media has become mainstream, extending far beyond the actions of a few bad actors. 

In an information environment characterised by high volumes of information and limited levels of user attention and trust, the tools and techniques of computational propaganda are becoming a common and arguably an essential part of digital campaigning and public diplomacy. 

While many countries have seen an increase in computational propaganda on social media, attribution back to a particular actor remains difficult. 

One important feature of the organisation of manipulation campaigns is that cyber troops often work in conjunction with private industry, civil society organisations, Internet sub-cultures, youth groups, hacker collectives, fringe movements, social media influencers, and volunteers who ideologically support their cause. 

The distinction between these groups can often be difficult to draw, especially since activities can be implicitly and explicitly sanctioned by the state. Evidence of organised social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017.

In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda is being used as a tool of information control in three distinct ways: to suppress fundamental human rights, discredit political opponents, and drown out dissenting opinions. 

A handful of sophisticated state actors use computational propaganda for foreign influence operations. Facebook and Twitter attributed foreign influence operations to seven countries (China, India, Iran, Pakistan, Russia, Saudi Arabia, and Venezuela) who have used these platforms to influence global audiences.

Facebook remains the platform of choice for social media manipulation. In 56 countries, the Oxford researchers found evidence of formally organised computational propaganda campaigns on Facebook

China has become a major player in the global disinformation order. Until the 2019 protests in Hong Kong, most evidence of Chinese computational propaganda occurred on domestic platforms such as Weibo, WeChat, and QQ. But China’s new-found interest in aggressively using Facebook, Twitter, and YouTube should raise concerns for democracies.
Computational propaganda has become a normal part of the digital public sphere. These techniques will also continue to evolve as new technologies, including Artificial Intelligence, Virtual Reality, or the Internet of Things, are poised to fundamentally reshape society and politics. 

But since computational propaganda is a symptom of long-standing challenges to democracy, it is important that solutions take into consideration these systemic challenges. 

It must also consider the role social media platforms have played in shaping the current information environment. A strong democracy requires access to high-quality information and an ability for citizens to come together to debate, discuss, deliberate, empathise, and make concessions. 

Oxford Internet Institute:

You Might Also Read:

Social Media Is The New Gutenberg:

 

« Huawei Will Sell Its 5G Know-How
Rogue States Are Funding Stateless Hackers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Krypsis

Krypsis

Krypsys is an information security company with a focus on helping you defend your information and data against emerging security threats.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

National Security Services Group (NSSG) - Oman

National Security Services Group (NSSG) - Oman

National Security Services Group (NSSG) is Oman's leading and only proprietary Cybersecurity consultancy firm and Managed Security Services Provider.

Cyber Security Authority (CSA) - Ghana

Cyber Security Authority (CSA) - Ghana

The Cyber Security Authority has been established to regulate cybersecurity activities in Ghana.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

Rebellion Defense

Rebellion Defense

Rebellion Defense is a technology company developing advanced software to ensure mission-critical organizations stay ahead of emerging threats.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.

Nyx Security Solutions

Nyx Security Solutions

Nyx is committed to excellence in embedded cybersecurity, delivering top-tier secure design, development, and penetration testing services that meet and exceed industry standards.