Twitter Takes-Down Thousands Of Propaganda Accounts

Twitter has removed 3,465 state-backed accounts from its platform in an effort to limit the influence of information manipulation and disinformation campaigns on the site. In a statement, Twitter said they identified and removed eight different distinct operations that were traced back to China, Mexico, Russia, Tanzania, Uganda, and Venezuela. 

The accounts and content associated with the operations have been permanently removed from the social media platform.

Twitter reported that the majority of the accounts removed in the latest takedown were linked to China, with over 2,000 accounts amplifying Chinese Communist Party narratives related to the treatment of the Uyghur population. Another group of accounts was promoting Changyu Culture, a private company that is backed by the Xinjiang regional government. The social media platform also explained that Uganda had 418 accounts linked to inauthentic activity promoting the removal of Uganda's President Museveni.

It is not yet known how Twitter knew which accounts to remove, but their blog post gave the following outline:

  • China - 2,160 accounts linked to the Chinese state were removed
  • Uganda - 418 accounts linked to the Ugandan state were removed
  • Mexico - 276 accounts linked with the Mexican state were removed
  • Tanzania - 268 accounts linked to the Tanzanian state were removed
  • Venezuela - 277 accounts linked to the Venezuelan state were removed
  • Russia - 66 accounts linked to Russian state were removed

In addition to banning these accounts and the content shared by them, Twitter has shared relevant data from this disclosure with the Australian Strategic Policy Institute and the Stanford Internet Observatory. 

The company said it will start the Twitter moderation research consortium in early 2022 to study platform governance issues. Meanwhile, the company also blocked users from sharing private images of other people without their consent, in a tightening of the network´s policy just a day after it changed CEOs.

Under the new rules, people who are not public figures can ask Twitter to take down pictures or videos of them that they report were posted without permission.

The company has also noted a “disproportionate effect on women, activists, dissidents, and members of minority communities.” High-profile examples of online harassment include a barrages of racist, sexist and homophobic abuse on Twitch, the world´s biggest video game streaming site.

Twitter:     Reuters:      CityAM:     Oodaloop:     The Hindu:      ZDNet:     Daily Mail:     MMNews

You Might Also Read: 

Do People Lie More Often When Using Social Media?:

 

« Multiple Location Supermarket Suffers Supply Chain Attack
Amazon Cloud Outage Affects Major Customers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: Enhance Your Cloud Security With EDR &NDR

WEBINAR: Enhance Your Cloud Security With EDR &NDR

Thursday, 19 May, 2022 - Join this webinar to learn how to apply endpoint and network detection and response (EDR/NDR) concepts to your cloud asset protection strategy.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

Data Protection Commission (DPC)

Data Protection Commission (DPC)

The Data Protection Commission (DPC) is the national independent authority responsible for upholding the fundamental right of individuals in the EU to have their personal data protected.