Top Twitter Executive Is A British Soldier

The senior Twitter executive with editorial responsibility for the Middle East is also a part-time officer in the British Army’s psychological warfare unit, reporters at Middle East Eye has established. 

Gordon MacMillan, who joined the social media company's UK office six years ago, has for several years also served with the 77th Brigade, a unit formed in 2015 in order to develop “non-lethal” ways of waging war.

The 77th Brigade uses social media platforms such as Twitter, Instagram and Facebook, as well as podcasts, data analysis and audience research to wage what the head of the UK military, General Nick Carter, describes as “information warfare”.
Carter says the 77th Brigade is giving the British military “the capability to compete in the war of narratives at the tactical level”; to shape perceptions of conflict. Some soldiers who have served with the unit say they have been engaged in operations intended to change the behaviour of target audiences.

What exactly MacMillan is doing with the unit is difficult to determine, however: he has declined to answer any questions about his role, as has Twitter and the UK’s Ministry of Defence (MoD).

Twitter would say only that “we actively encourage all our employees to pursue external interests”, while the MoD said that the 77th Brigade had no relationship with Twitter, other than using it for communication. The 77th Brigade's headquarters is located west of London. It brought together a number of existing military units such as the Media Operations Group and the 15 Psychological Operations Group.

At its launch, the UK media was told that the new unit of “Facebook warriors” would be around 1,500 strong, and made up of both regular soldiers and reservists. In recent months, the army has been approaching British journalists and asking them to join the unit as reservists.

While clearly engaged in propaganda, the MoD is reluctant to use that word to describe the unit’s operations. Instead, the British army’s website describes the 77th Brigade as “an agent of change” which aims to “challenge the difficulties of modern warfare using non-lethal engagement and legitimate non-military levers as a means to adapt behaviours of the opposing forces and adversaries”.

MacMillan, whose editorial responsibilities at Twitter also cover Europe and Africa, was a captain in the unit at the end of 2016, according to one British army publication. The MoD will not disclose his current rank. His involvement with the 77th Brigade was made public when he disclosed it on his page at LinkedIn, the online professional networking site.

As well as outlining his responsibilities at Twitter, MacMillan wrote that he had an interest in politics and international affairs, had trained at Sandhurst, the British military academy, “and am a reserve officer in the British Army serving in 77th Brigade, which specialises in non-lethal engagement”. His page has recently been edited to remove all references to his service with 77th Brigade.

MacMillan is not alone in outlining his involvement with the unit on his LinkedIn page. A former 77th Brigade officer has said on his page that he served with the unit’s “Information Warfare Teams” in the UK, Bosnia, France, Kenya and Albania.

Some insight into the unit’s methods was provided by Carter at the Royal United Services Institute, a London-based military and defence think tank.

“In our 77 Brigade … we have got some remarkable talent when it comes to social media, production design, and indeed Arabic poetry.... Those sorts of skills we can’t afford to retain in the Regular component of the army but they are the means of us delivering capability in a much more imaginative way than we might have been able to do in the past.....We also, though, need to continue to improve our ability to fight on this new battlefield, and I think it’s important that we build on the excellent foundation we’ve created for Information Warfare through our 77 Brigade which is now giving us the capability to compete in the war of narratives at the tactical level.”

Covert influence campaigns
With the Arab Spring demonstrating, almost a decade ago, that protestors could topple tyrants after sharing information on social media, and with the wider realisation that technology has shifted some power from national governments and media companies towards networks of individuals, many observers assumed it was only a matter of time before the state began to counter that trend.

Covert influence campaigns being mounted by states such as Russia and China have been identified and exposed on a number of occasions. In August, Facebook announced that it had shut down multiple accounts run by a company called New Waves, based in Cairo and an Emirati firm, Newave.

Middle East Eye:        LinkedIn

You Might Also Read: 

British Army Reshapes Itself To Fight Cyberwars:

Army Chief Urges  UK To Increase Cyber Defence & Attack Capabilities:

 

 

« Employee Training Is Vital For Commercial Cybersecurity
Britain Is At Cyber War Every Day »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service - basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

European Data Protection Supervisor (EDPS)

European Data Protection Supervisor (EDPS)

The EDPS is the European Union’s independent data protection authority. We monitor and ensure the protection of personal data and privacy when EU institutions and bodies process personal information.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.