Top Twitter Executive Is A British Soldier

The senior Twitter executive with editorial responsibility for the Middle East is also a part-time officer in the British Army’s psychological warfare unit, reporters at Middle East Eye has established. 

Gordon MacMillan, who joined the social media company's UK office six years ago, has for several years also served with the 77th Brigade, a unit formed in 2015 in order to develop “non-lethal” ways of waging war.

The 77th Brigade uses social media platforms such as Twitter, Instagram and Facebook, as well as podcasts, data analysis and audience research to wage what the head of the UK military, General Nick Carter, describes as “information warfare”.
Carter says the 77th Brigade is giving the British military “the capability to compete in the war of narratives at the tactical level”; to shape perceptions of conflict. Some soldiers who have served with the unit say they have been engaged in operations intended to change the behaviour of target audiences.

What exactly MacMillan is doing with the unit is difficult to determine, however: he has declined to answer any questions about his role, as has Twitter and the UK’s Ministry of Defence (MoD).

Twitter would say only that “we actively encourage all our employees to pursue external interests”, while the MoD said that the 77th Brigade had no relationship with Twitter, other than using it for communication. The 77th Brigade's headquarters is located west of London. It brought together a number of existing military units such as the Media Operations Group and the 15 Psychological Operations Group.

At its launch, the UK media was told that the new unit of “Facebook warriors” would be around 1,500 strong, and made up of both regular soldiers and reservists. In recent months, the army has been approaching British journalists and asking them to join the unit as reservists.

While clearly engaged in propaganda, the MoD is reluctant to use that word to describe the unit’s operations. Instead, the British army’s website describes the 77th Brigade as “an agent of change” which aims to “challenge the difficulties of modern warfare using non-lethal engagement and legitimate non-military levers as a means to adapt behaviours of the opposing forces and adversaries”.

MacMillan, whose editorial responsibilities at Twitter also cover Europe and Africa, was a captain in the unit at the end of 2016, according to one British army publication. The MoD will not disclose his current rank. His involvement with the 77th Brigade was made public when he disclosed it on his page at LinkedIn, the online professional networking site.

As well as outlining his responsibilities at Twitter, MacMillan wrote that he had an interest in politics and international affairs, had trained at Sandhurst, the British military academy, “and am a reserve officer in the British Army serving in 77th Brigade, which specialises in non-lethal engagement”. His page has recently been edited to remove all references to his service with 77th Brigade.

MacMillan is not alone in outlining his involvement with the unit on his LinkedIn page. A former 77th Brigade officer has said on his page that he served with the unit’s “Information Warfare Teams” in the UK, Bosnia, France, Kenya and Albania.

Some insight into the unit’s methods was provided by Carter at the Royal United Services Institute, a London-based military and defence think tank.

“In our 77 Brigade … we have got some remarkable talent when it comes to social media, production design, and indeed Arabic poetry.... Those sorts of skills we can’t afford to retain in the Regular component of the army but they are the means of us delivering capability in a much more imaginative way than we might have been able to do in the past.....We also, though, need to continue to improve our ability to fight on this new battlefield, and I think it’s important that we build on the excellent foundation we’ve created for Information Warfare through our 77 Brigade which is now giving us the capability to compete in the war of narratives at the tactical level.”

Covert influence campaigns
With the Arab Spring demonstrating, almost a decade ago, that protestors could topple tyrants after sharing information on social media, and with the wider realisation that technology has shifted some power from national governments and media companies towards networks of individuals, many observers assumed it was only a matter of time before the state began to counter that trend.

Covert influence campaigns being mounted by states such as Russia and China have been identified and exposed on a number of occasions. In August, Facebook announced that it had shut down multiple accounts run by a company called New Waves, based in Cairo and an Emirati firm, Newave.

Middle East Eye:        LinkedIn

You Might Also Read: 

British Army Reshapes Itself To Fight Cyberwars:

Army Chief Urges  UK To Increase Cyber Defence & Attack Capabilities:

 

 

« Employee Training Is Vital For Commercial Cybersecurity
Britain Is At Cyber War Every Day »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

QuantiCor Security

QuantiCor Security

QuantiCor Security is one of the world’s leading developers and manufacturers of quantum computer resistant security solutions for IT infrastructures and the Internet of Things (IoT).

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Airlock Digital

Airlock Digital

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia.

Oxford Information Labs (OXIL)

Oxford Information Labs (OXIL)

Oxford Information Labs brings together world-class software programmers and policy experts to provide a unique mix of expertise and hands on technical solutions.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

Tulpa AI

Tulpa AI

Tulpa develops safe AI assistants (co-pilots) to support and enhance human performance in high-stakes, mission-critical decision-making environments.

Sensiba

Sensiba

Sensiba are accountants, consultants, and experts in good business. We use deep industry experience to help organizations solve problems, navigate complexity, and build sustainable growth.