Twitter Takes-Down Thousands Of Propaganda Accounts

Twitter has removed 3,465 state-backed accounts from its platform in an effort to limit the influence of information manipulation and disinformation campaigns on the site. In a statement, Twitter said they identified and removed eight different distinct operations that were traced back to China, Mexico, Russia, Tanzania, Uganda, and Venezuela. 

The accounts and content associated with the operations have been permanently removed from the social media platform.

Twitter reported that the majority of the accounts removed in the latest takedown were linked to China, with over 2,000 accounts amplifying Chinese Communist Party narratives related to the treatment of the Uyghur population. Another group of accounts was promoting Changyu Culture, a private company that is backed by the Xinjiang regional government. The social media platform also explained that Uganda had 418 accounts linked to inauthentic activity promoting the removal of Uganda's President Museveni.

It is not yet known how Twitter knew which accounts to remove, but their blog post gave the following outline:

  • China - 2,160 accounts linked to the Chinese state were removed
  • Uganda - 418 accounts linked to the Ugandan state were removed
  • Mexico - 276 accounts linked with the Mexican state were removed
  • Tanzania - 268 accounts linked to the Tanzanian state were removed
  • Venezuela - 277 accounts linked to the Venezuelan state were removed
  • Russia - 66 accounts linked to Russian state were removed

In addition to banning these accounts and the content shared by them, Twitter has shared relevant data from this disclosure with the Australian Strategic Policy Institute and the Stanford Internet Observatory. 

The company said it will start the Twitter moderation research consortium in early 2022 to study platform governance issues. Meanwhile, the company also blocked users from sharing private images of other people without their consent, in a tightening of the network´s policy just a day after it changed CEOs.

Under the new rules, people who are not public figures can ask Twitter to take down pictures or videos of them that they report were posted without permission.

The company has also noted a “disproportionate effect on women, activists, dissidents, and members of minority communities.” High-profile examples of online harassment include a barrages of racist, sexist and homophobic abuse on Twitch, the world´s biggest video game streaming site.

Twitter:     Reuters:      CityAM:     Oodaloop:     The Hindu:      ZDNet:     Daily Mail:     MMNews

You Might Also Read: 

Do People Lie More Often When Using Social Media?:

 

« Multiple Location Supermarket Suffers Supply Chain Attack
Amazon Cloud Outage Affects Major Customers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

CyberTest

CyberTest

CyberTest offers cybersecurity consulting and penetration testing services that helps organizations and businesses securing their assets.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.