Organised Social Media Manipulation

Propaganda has always been part of political discourse going back through publishing history and was one of the main reasons why governments allowed newspapers to operate in their country. But now, with the expansion and subtle manipulation of information, fake-news and propaganda, this data misuse has significantly increased and is raising public concern. 

A new Report written by the Oxford University’s Internet Institute called The Global Disinformation Order has recently been published. 

This excellent Report goes into depth about the increasing global data and information propaganda that is taking place but governments across the globe.The use of computational propaganda to shape public attitudes via social media has become mainstream, extending far beyond the actions of a few bad actors. 

In an information environment characterised by high volumes of information and limited levels of user attention and trust, the tools and techniques of computational propaganda are becoming a common and arguably an essential part of digital campaigning and public diplomacy. 

While many countries have seen an increase in computational propaganda on social media, attribution back to a particular actor remains difficult. 

One important feature of the organisation of manipulation campaigns is that cyber troops often work in conjunction with private industry, civil society organisations, Internet sub-cultures, youth groups, hacker collectives, fringe movements, social media influencers, and volunteers who ideologically support their cause. 

The distinction between these groups can often be difficult to draw, especially since activities can be implicitly and explicitly sanctioned by the state. Evidence of organised social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017.

In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda is being used as a tool of information control in three distinct ways: to suppress fundamental human rights, discredit political opponents, and drown out dissenting opinions. 

A handful of sophisticated state actors use computational propaganda for foreign influence operations. Facebook and Twitter attributed foreign influence operations to seven countries (China, India, Iran, Pakistan, Russia, Saudi Arabia, and Venezuela) who have used these platforms to influence global audiences.

Facebook remains the platform of choice for social media manipulation. In 56 countries, the Oxford researchers found evidence of formally organised computational propaganda campaigns on Facebook

China has become a major player in the global disinformation order. Until the 2019 protests in Hong Kong, most evidence of Chinese computational propaganda occurred on domestic platforms such as Weibo, WeChat, and QQ. But China’s new-found interest in aggressively using Facebook, Twitter, and YouTube should raise concerns for democracies.
Computational propaganda has become a normal part of the digital public sphere. These techniques will also continue to evolve as new technologies, including Artificial Intelligence, Virtual Reality, or the Internet of Things, are poised to fundamentally reshape society and politics. 

But since computational propaganda is a symptom of long-standing challenges to democracy, it is important that solutions take into consideration these systemic challenges. 

It must also consider the role social media platforms have played in shaping the current information environment. A strong democracy requires access to high-quality information and an ability for citizens to come together to debate, discuss, deliberate, empathise, and make concessions. 

Oxford Internet Institute:

You Might Also Read:

Social Media Is The New Gutenberg:

 

« Huawei Will Sell Its 5G Know-How
Rogue States Are Funding Stateless Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

Absa Cybersecurity Academy

Absa Cybersecurity Academy

Absa Cybersecurity Academy is an initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists.

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

du

du

du is a telecommunications service provider providing UAE businesses with a vast range of ICT and managed services.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.