Fake News Generated Against Hong Kong Protesters

Research by the Journalism and Media Studies Center of the Hong Kong University has begun to reveal the disinformation spread on social media the 2019 Hong Kong protests by China where these events are being framed as a separatist movement.

A University of Hong Kong (HKU) team scrutinising images, videos and any information from the ongoing anti-government protests, trying to tell which are real, misleading or fake.

Since August 2019, China’s information operations on Hong Kong protests have been unveiled internationally. This was brought to the light after a number of social media platforms, including Twitter and Facebook, discovered the existence of coordinated network activities by China that were spreading disinformation about Honk Kong protests. Twitter has said that the aim of these operations was to undermine the protest movement’s “legitimacy and political positions.”

As Twitter and Facebook’s reports had not addressed the nature of disinformation in the operation, a research team headed by Professor Fu King-wa of the Journalism and Media Studies Center of the Hong Kong University conducted follow-up research and ran data analysis on content from 640,000 Twitter user accounts which actively posted Hong Kong-related news since June 2019. The research is still ongoing.

The initial analysis shows that about 20 percent of the 640,000 Twitter users were bots and this percentage is much higher than previous research about information operations in other countries. 

For example, the percentage of bots in Russian information operations regarding Ukraine was just about 8 percent according to a research on Russian social media influence published by RAND corporation in 2018. Inside China’s Great Firewall, disinformation spread on social media was mainly aimed at constructing a separatist or “pro-Hong Kong independence” frame for Hong Kong’s anti-extradition movement. Everything related to Hong Kong protests on China’s Weibo was labeled as acts of “pro-Hong Kong independence” by social media news outlets. 

Even the pro-Hong Kong protests comments that are made outside the Great Firewall on Twitter, Facebook and Instagram, once they are spotted by mainland Chinese netizens and reported on Chinese social media platforms.

These individual users could face tremendous pressure, in particular if they have social and business connections with China. Furthermore to ocurrence  violent acts by pro-Beijing elements had been praised on mainland Chinese social media as heroic acts. For example, the Lennon Walls, a public art space which has been set up spontaneously by local residents in many districts for free expression, are labelled “pro-Hong Kong independence” sites and those who have taken action to destroy the walls are depicted as the righteous ones. 

However, “Hong Kong independence” is not even an agenda of the Hong Kong protesters, who have been taking to the streets since March 2019. 

The five demands of the protests are complete withdrawal of the extradition bill, which would authorise Hong Kong to extradite crime suspects to mainland China for trial, independent investigation into police operations, the dropping of all riot charges against the protesters, amnesty for arrested protesters, and universal suffrage to the Legislature and the Chief Executive. 
None of these demands include calls for Hong Kong independence.

The research team will continue to dig further into the data for a more elaborate analysis of China’s information operations in relation to the Hong Kong protests. However, initial findings strongly suggest that the Chinese Communist party and state media apparatus have played a key role in spreading information framing the protests as a “pro-Hong Kong independence” movement. 

Such attempts are intended to mislead China’s public opinion that the discontent is part of a separatist political plot to undermine the “integrity of Chinese territory”, a phrase repeatedly used among mainland Chinese online patriots.

Global Voices:           SCMP

You Might Also Read: 

Police Location App Used By Hong Kong Protesters Deleted:

 

« Cyber Attack On A Nuclear Power Plant
Cyber Crime Is An Increasing Risk For Charities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

Quick Heal Technologies

Quick Heal Technologies

Quick Heal Technologies is a leading IT security solutions provider focused on endpoint and network security solutions.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

Government Communications Security Bureau (GCSB)

Government Communications Security Bureau (GCSB)

GCSB contributes to New Zealand’s national security by providing information assurance and cyber security to the New Zealand Government and critical infrastructure organisations.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

CV-Library

CV-Library

Start your job search with 216,931 live UK vacancies on award-winning CV-Library. Register your CV and find local jobs near you today!

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.