Twitter Takes-Down Thousands Of Propaganda Accounts

Twitter has removed 3,465 state-backed accounts from its platform in an effort to limit the influence of information manipulation and disinformation campaigns on the site. In a statement, Twitter said they identified and removed eight different distinct operations that were traced back to China, Mexico, Russia, Tanzania, Uganda, and Venezuela. 

The accounts and content associated with the operations have been permanently removed from the social media platform.

Twitter reported that the majority of the accounts removed in the latest takedown were linked to China, with over 2,000 accounts amplifying Chinese Communist Party narratives related to the treatment of the Uyghur population. Another group of accounts was promoting Changyu Culture, a private company that is backed by the Xinjiang regional government. The social media platform also explained that Uganda had 418 accounts linked to inauthentic activity promoting the removal of Uganda's President Museveni.

It is not yet known how Twitter knew which accounts to remove, but their blog post gave the following outline:

  • China - 2,160 accounts linked to the Chinese state were removed
  • Uganda - 418 accounts linked to the Ugandan state were removed
  • Mexico - 276 accounts linked with the Mexican state were removed
  • Tanzania - 268 accounts linked to the Tanzanian state were removed
  • Venezuela - 277 accounts linked to the Venezuelan state were removed
  • Russia - 66 accounts linked to Russian state were removed

In addition to banning these accounts and the content shared by them, Twitter has shared relevant data from this disclosure with the Australian Strategic Policy Institute and the Stanford Internet Observatory. 

The company said it will start the Twitter moderation research consortium in early 2022 to study platform governance issues. Meanwhile, the company also blocked users from sharing private images of other people without their consent, in a tightening of the network´s policy just a day after it changed CEOs.

Under the new rules, people who are not public figures can ask Twitter to take down pictures or videos of them that they report were posted without permission.

The company has also noted a “disproportionate effect on women, activists, dissidents, and members of minority communities.” High-profile examples of online harassment include a barrages of racist, sexist and homophobic abuse on Twitch, the world´s biggest video game streaming site.

Twitter:     Reuters:      CityAM:     Oodaloop:     The Hindu:      ZDNet:     Daily Mail:     MMNews

You Might Also Read: 

Do People Lie More Often When Using Social Media?:

 

« Multiple Location Supermarket Suffers Supply Chain Attack
Amazon Cloud Outage Affects Major Customers »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

ANSEC IA

ANSEC IA

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally.

Fortified Health Security

Fortified Health Security

Fortified’s team of cybersecurity specialists is dedicated to helping healthcare providers, payers and business associates protect their patient data across the Fortified Healthcare Ecosystem.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

ERCOM

ERCOM

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.

Defend-OT

Defend-OT

Defend-OT is a Belgium-based cybersecurity firm specializing in OT environments.