Twitter Takes-Down Thousands Of Propaganda Accounts

Twitter has removed 3,465 state-backed accounts from its platform in an effort to limit the influence of information manipulation and disinformation campaigns on the site. In a statement, Twitter said they identified and removed eight different distinct operations that were traced back to China, Mexico, Russia, Tanzania, Uganda, and Venezuela. 

The accounts and content associated with the operations have been permanently removed from the social media platform.

Twitter reported that the majority of the accounts removed in the latest takedown were linked to China, with over 2,000 accounts amplifying Chinese Communist Party narratives related to the treatment of the Uyghur population. Another group of accounts was promoting Changyu Culture, a private company that is backed by the Xinjiang regional government. The social media platform also explained that Uganda had 418 accounts linked to inauthentic activity promoting the removal of Uganda's President Museveni.

It is not yet known how Twitter knew which accounts to remove, but their blog post gave the following outline:

  • China - 2,160 accounts linked to the Chinese state were removed
  • Uganda - 418 accounts linked to the Ugandan state were removed
  • Mexico - 276 accounts linked with the Mexican state were removed
  • Tanzania - 268 accounts linked to the Tanzanian state were removed
  • Venezuela - 277 accounts linked to the Venezuelan state were removed
  • Russia - 66 accounts linked to Russian state were removed

In addition to banning these accounts and the content shared by them, Twitter has shared relevant data from this disclosure with the Australian Strategic Policy Institute and the Stanford Internet Observatory. 

The company said it will start the Twitter moderation research consortium in early 2022 to study platform governance issues. Meanwhile, the company also blocked users from sharing private images of other people without their consent, in a tightening of the network´s policy just a day after it changed CEOs.

Under the new rules, people who are not public figures can ask Twitter to take down pictures or videos of them that they report were posted without permission.

The company has also noted a “disproportionate effect on women, activists, dissidents, and members of minority communities.” High-profile examples of online harassment include a barrages of racist, sexist and homophobic abuse on Twitch, the world´s biggest video game streaming site.

Twitter:     Reuters:      CityAM:     Oodaloop:     The Hindu:      ZDNet:     Daily Mail:     MMNews

You Might Also Read: 

Do People Lie More Often When Using Social Media?:

 

« Multiple Location Supermarket Suffers Supply Chain Attack
Amazon Cloud Outage Affects Major Customers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Sapphire

Sapphire

Sapphire deliver flexible and scalable cybersecurity solutions, helping organisations to detect, protect, respond and remediate against cyber threats.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

Sunartek Labs

Sunartek Labs

Sunartek are equipped with expert resources and advanced technology to identify cyber threats and prevent any breach, bypassing the security network of your organization.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.

AI Safety Institute (AISI)

AI Safety Institute (AISI)

The AI Safety Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.