Social Media’s Impact On The War In Ukraine

Russia’s invasion of Ukraine had shocked the world, and this war often has the headlines in print and broadcast media and it has flooded social media platforms. When Russia initiated its full-scale invasion of Ukraine, a second, less visible battle in cyberspace got under way.

Since Russia’s invasion of Ukraine on February 24, 2022, companies providing social media and messaging services have often taken steps to counter harmful disinformation and they have frequently blocked state-sponsored or state-affiliated media, and to introduce extra safety measures.

Yet social media has generated a wealth of propaganda and disinformation surrounding the Russia-Ukraine War and has become a veritable information battleground as both countries use social media to discredit each other and influence global opinion. 

The big tech companies have become increasingly involved in the Ukraine-Russia conflict, both as tools of propaganda and as facilitators of communication and collaboration.

With millions of people in Ukraine and Russia, as well as around the world, using social media platforms like Twitter, Facebook, and Instagram, the conflict has been documented and analysed in real-time, with both sides using social media to push their agendas and influence public opinion.

Along with physical violence, the war is also being fought on an ideological front. Both Russia and Ukraine have been using social media platforms to spread false information, influence public opinion and policymakers, and even impacting military operations themselves. The Russian propaganda machine supplies a constant barrage of fake news stories and accounts, conspiracy theories, doctored images, and manipulated videos that have become more effective through social media.

For example, in 2014, Russian state media used social media platforms to push the false narrative that the Ukrainian military was responsible for downing Malaysian Airlines Flight MH17.

Furthermore, in preparation for the 2022 invasion, Russian state media started pushing the false theory that the US had a secret bioweapons lab located in Ukraine responsible for harboring the COVID-19 virus. Even before Russia’s occupation of Crimea and its support for the conflict in eastern Ukraine, the authorities have deployed elaborate, state-driven propaganda through which they have disseminated malicious disinformation, invented “facts” and lies, and wild exaggerations.  These include baseless claims about Kyiv being overrun by “Nazis,” and existential threats to ethnic Russians. This has played a crucial role in escalating tensions in Ukraine and fanning the flames of the conflict since it started in 2014.

Social media has generated a wealth of propaganda and disinformation surrounding the Russia-Ukraine War and has become an information battleground as both countries use social media to discredit each other and influence global opinion.

Many young people across the western world use social media to access what they beleive to be trustworthy aned reliable news. Social media is easier and faster to access than many conventional new sources like print, radio and TV news and users place a high value on its interactivity.

In the digital age, most audiences and social media users are not passive consumers of media but are proactively seeking out media that meets their political views and beliefs. There is no substitute for robust journalism that is accurate, fair, objective, and keeps bias and propaganda out of reporting. If these principles are violated, people will continue to migrate to social media, where they find more independence and perceived objectivity. 

This only further complicates matters, specifically during times of war, as social media is again and again shown to be an effective vehicle for spreading misinformation.  The amplified usage of propaganda deepens public distrust of the media, especially among engaged audiences, and will not produce solutions to foreign policy problems or lead to lasting solutions to the conflict in Ukraine.

CIGI:    BBC:      BBC:     Human Right Watch:      I-HLS;    Cairo Review:       Cybernews:     

You Might Also Read: 

Social Media Has Been Weaponised:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Pakistan's Hackers Attack India's Education Sector
US Threatens National Ban On TikTok »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

Muninn

Muninn

At Muninn (aka Wehowsky), we specialize in mitigating potential risks within your network, providing one of the leading network detection and response (NDR) solutions on the market.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Penta Security

Penta Security

Founded on its data encryption technology, Penta Security is a leading provider of web and data security products, solutions and services.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Cequence Security

Cequence Security

Cequence secures web, mobile, and API applications. We discover all apps, detect malicious bots, and stop attacks with an AI-integrated security platform.

Polyrize

Polyrize

The Polyrize continuous authorization platform for SaaS and IaaS stops tomorrow's public cloud cyber threats, today.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Stone Forest IT (SFIT)

Stone Forest IT (SFIT)

Stone Forest IT specialises in providing advisory, implementation and managed services for IT infrastructure, IT security solutions, business applications (ERP and CRM) and business analytical tools.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

Tenable

Tenable

Organizations around the world rely on Tenable to help them understand and reduce cybersecurity risk across their attack surface—in the cloud or on-premises, from IT to OT and beyond.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.