Social Media’s Impact On The War In Ukraine

Russia’s invasion of Ukraine had shocked the world, and this war often has the headlines in print and broadcast media and it has flooded social media platforms. When Russia initiated its full-scale invasion of Ukraine, a second, less visible battle in cyberspace got under way.

Since Russia’s invasion of Ukraine on February 24, 2022, companies providing social media and messaging services have often taken steps to counter harmful disinformation and they have frequently blocked state-sponsored or state-affiliated media, and to introduce extra safety measures.

Yet social media has generated a wealth of propaganda and disinformation surrounding the Russia-Ukraine War and has become a veritable information battleground as both countries use social media to discredit each other and influence global opinion. 

The big tech companies have become increasingly involved in the Ukraine-Russia conflict, both as tools of propaganda and as facilitators of communication and collaboration.

With millions of people in Ukraine and Russia, as well as around the world, using social media platforms like Twitter, Facebook, and Instagram, the conflict has been documented and analysed in real-time, with both sides using social media to push their agendas and influence public opinion.

Along with physical violence, the war is also being fought on an ideological front. Both Russia and Ukraine have been using social media platforms to spread false information, influence public opinion and policymakers, and even impacting military operations themselves. The Russian propaganda machine supplies a constant barrage of fake news stories and accounts, conspiracy theories, doctored images, and manipulated videos that have become more effective through social media.

For example, in 2014, Russian state media used social media platforms to push the false narrative that the Ukrainian military was responsible for downing Malaysian Airlines Flight MH17.

Furthermore, in preparation for the 2022 invasion, Russian state media started pushing the false theory that the US had a secret bioweapons lab located in Ukraine responsible for harboring the COVID-19 virus. Even before Russia’s occupation of Crimea and its support for the conflict in eastern Ukraine, the authorities have deployed elaborate, state-driven propaganda through which they have disseminated malicious disinformation, invented “facts” and lies, and wild exaggerations.  These include baseless claims about Kyiv being overrun by “Nazis,” and existential threats to ethnic Russians. This has played a crucial role in escalating tensions in Ukraine and fanning the flames of the conflict since it started in 2014.

Social media has generated a wealth of propaganda and disinformation surrounding the Russia-Ukraine War and has become an information battleground as both countries use social media to discredit each other and influence global opinion.

Many young people across the western world use social media to access what they beleive to be trustworthy aned reliable news. Social media is easier and faster to access than many conventional new sources like print, radio and TV news and users place a high value on its interactivity.

In the digital age, most audiences and social media users are not passive consumers of media but are proactively seeking out media that meets their political views and beliefs. There is no substitute for robust journalism that is accurate, fair, objective, and keeps bias and propaganda out of reporting. If these principles are violated, people will continue to migrate to social media, where they find more independence and perceived objectivity. 

This only further complicates matters, specifically during times of war, as social media is again and again shown to be an effective vehicle for spreading misinformation.  The amplified usage of propaganda deepens public distrust of the media, especially among engaged audiences, and will not produce solutions to foreign policy problems or lead to lasting solutions to the conflict in Ukraine.

CIGI:    BBC:      BBC:     Human Right Watch:      I-HLS;    Cairo Review:       Cybernews:     

You Might Also Read: 

Social Media Has Been Weaponised:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Pakistan's Hackers Attack India's Education Sector
US Threatens National Ban On TikTok »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

Shinobi Cyber

Shinobi Cyber

Shinobi Defense System is an integrated security system that absolutely secures information with smart, automatic encryption and protects your endpoints by stopping any unauthorized actions.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startups Association is an umbrella organization that aims to promote, support and represent the interests of tech startups in Romania.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.

Trium Cyber

Trium Cyber

Trium Cyber - Expert Cyber Underwriting and Claims Management. Based in the US and UK. Backed by Lloyd’s of London.