X Is A Vehicle For Political Propaganda

Two years after Elon Musk completed his controversial $44 billion takeover of Twitter in 2022, the platform has become a hotbed for the 2024 US Presidential election campaign, abounding with fake news, misinformation and disinformation, being made available to its 200 million users. 

Musk, who is reported to be one of the world's wealthiest men, bought Twitter, now called X, in a personal capacity. He has since relaxed policies on the moderation of the range and nature of content posted to the platform and and is widely thought to have tilted it in a more politically conservative direction.

In particular, his critics claim the platform has been used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

Musk is reported to have had secret talks with Russian President, Vladimir Putin and to have good business relations with with the government of China. He is on record as having contributed millions of dollars to Donald Trump's Presidential election campaign.

In case Trumps is re-elected, Musk is expected to join the Trump administration, possibly at Cabinet level, with direct influence over the conduct of US federal agencies.

The role of extremely wealthy individuals in US politics is hardly new, and Musk is not the only person whose great wealth has enabled them to seek influence over politics, business and foreign policy. Bill Gates, past-CEO and still a major investor in Microsoft (owner of the  LinkedIn social media platform) has donated $50million to Kamala Harris' election campaign. 

But few are working so publicly for a single candidate as Elon Musk, whose critics claim poses a test to the limits on one unelected person's political power, a consequences of the US Supreme Court's 2010 'Citizens United' decision which eliminated many of the previous legal limits on political donations. The critics also say that X has become a powerful, politically motivated weapon to poison the information environment, by filling it with dangerous, false, and unsubstantiated rumours about election fraud that can reach mass audiences. 

The real value of Musk's ownership of X is becoming apparent in the few days remaining before the polls close on November 5th.

A South-African born US citizen, Musk has personally intervened in British politics, posting and then deleting a fake headline that wrongly claimed Prime Minister Keir Starmer was considering sending anti-immigtration rioters to emergency prison camps in the distant Falkland Islands. 

The Atlantic   |   Fortune   |   Politico   |    ABC   |   NPR   |   LeMonde   |   Rolling Stone   |    New York Times

Image: Ideogram

You Might Also Read: 

X Blocked In Brazil By Supreme Court Order:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Google Urges Windows Users To Update Chrome Amid New Security Threats
The Developer’s Guide To Preventing Data Leaks & Breaches In Software »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

TechVets

TechVets

TechVets is a non-for-profit helping UK veterans and service leavers retrain into Cyber Security and Technology jobs.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Nuance Communications

Nuance Communications

From revolutionizing the doctor-patient relationship to reinventing the way brands connect with their customers, Nuance technology helps organizations push the boundaries of what’s possible.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.

Morrow Global Network

Morrow Global Network

Morrow is the global venture network for venture accelerators, studios, hubs, and their visionary leaders.