Twitter Takes-Down Thousands Of Propaganda Accounts

Twitter has removed 3,465 state-backed accounts from its platform in an effort to limit the influence of information manipulation and disinformation campaigns on the site. In a statement, Twitter said they identified and removed eight different distinct operations that were traced back to China, Mexico, Russia, Tanzania, Uganda, and Venezuela. 

The accounts and content associated with the operations have been permanently removed from the social media platform.

Twitter reported that the majority of the accounts removed in the latest takedown were linked to China, with over 2,000 accounts amplifying Chinese Communist Party narratives related to the treatment of the Uyghur population. Another group of accounts was promoting Changyu Culture, a private company that is backed by the Xinjiang regional government. The social media platform also explained that Uganda had 418 accounts linked to inauthentic activity promoting the removal of Uganda's President Museveni.

It is not yet known how Twitter knew which accounts to remove, but their blog post gave the following outline:

  • China - 2,160 accounts linked to the Chinese state were removed
  • Uganda - 418 accounts linked to the Ugandan state were removed
  • Mexico - 276 accounts linked with the Mexican state were removed
  • Tanzania - 268 accounts linked to the Tanzanian state were removed
  • Venezuela - 277 accounts linked to the Venezuelan state were removed
  • Russia - 66 accounts linked to Russian state were removed

In addition to banning these accounts and the content shared by them, Twitter has shared relevant data from this disclosure with the Australian Strategic Policy Institute and the Stanford Internet Observatory. 

The company said it will start the Twitter moderation research consortium in early 2022 to study platform governance issues. Meanwhile, the company also blocked users from sharing private images of other people without their consent, in a tightening of the network´s policy just a day after it changed CEOs.

Under the new rules, people who are not public figures can ask Twitter to take down pictures or videos of them that they report were posted without permission.

The company has also noted a “disproportionate effect on women, activists, dissidents, and members of minority communities.” High-profile examples of online harassment include a barrages of racist, sexist and homophobic abuse on Twitch, the world´s biggest video game streaming site.

Twitter:     Reuters:      CityAM:     Oodaloop:     The Hindu:      ZDNet:     Daily Mail:     MMNews

You Might Also Read: 

Do People Lie More Often When Using Social Media?:

 

« Multiple Location Supermarket Suffers Supply Chain Attack
Amazon Cloud Outage Affects Major Customers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ProfitBricks

ProfitBricks

ProfitBricks is a secure cloud computing infrastructure-as-a-service (IaaS) solution.

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

MindPoint Group

MindPoint Group

MindPoint Group is a specialist Information Security Consulting firm.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

OCM Business Systems

OCM Business Systems

OCM are experts in the safe, secure and responsible disposal of IT & EPoS assets.

NexGenT

NexGenT

NexGenT have combined military-style training with decades of network engineering and cyber security experience into an immersive program to get people into cyber security fast and effectively.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

Secure Forensics

Secure Forensics

Secure Forensics can assist in any situation that requires digital forensics or an investigation ranging from complex criminal matters to fraud and file tampering to cyber crime.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Cyber Security Partners (CSP)

Cyber Security Partners (CSP)

Cyber Security Partners specialise in the provision of Cyber Security Consultancy, Data Protection and Certification and Compliance services.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.