X Is A Vehicle For Political Propaganda

Two years after Elon Musk completed his controversial $44 billion takeover of Twitter in 2022, the platform has become a hotbed for the 2024 US Presidential election campaign, abounding with fake news, misinformation and disinformation, being made available to its 200 million users. 

Musk, who is reported to be one of the world's wealthiest men, bought Twitter, now called X, in a personal capacity. He has since relaxed policies on the moderation of the range and nature of content posted to the platform and and is widely thought to have tilted it in a more politically conservative direction.

In particular, his critics claim the platform has been used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

Musk is reported to have had secret talks with Russian President, Vladimir Putin and to have good business relations with with the government of China. He is on record as having contributed millions of dollars to Donald Trump's Presidential election campaign.

In case Trumps is re-elected, Musk is expected to join the Trump administration, possibly at Cabinet level, with direct influence over the conduct of US federal agencies.

The role of extremely wealthy individuals in US politics is hardly new, and Musk is not the only person whose great wealth has enabled them to seek influence over politics, business and foreign policy. Bill Gates, past-CEO and still a major investor in Microsoft (owner of the  LinkedIn social media platform) has donated $50million to Kamala Harris' election campaign. 

But few are working so publicly for a single candidate as Elon Musk, whose critics claim poses a test to the limits on one unelected person's political power, a consequences of the US Supreme Court's 2010 'Citizens United' decision which eliminated many of the previous legal limits on political donations. The critics also say that X has become a powerful, politically motivated weapon to poison the information environment, by filling it with dangerous, false, and unsubstantiated rumours about election fraud that can reach mass audiences. 

The real value of Musk's ownership of X is becoming apparent in the few days remaining before the polls close on November 5th.

A South-African born US citizen, Musk has personally intervened in British politics, posting and then deleting a fake headline that wrongly claimed Prime Minister Keir Starmer was considering sending anti-immigtration rioters to emergency prison camps in the distant Falkland Islands. 

The Atlantic   |   Fortune   |   Politico   |    ABC   |   NPR   |   LeMonde   |   Rolling Stone   |    New York Times

Image: Ideogram

You Might Also Read: 

X Blocked In Brazil By Supreme Court Order:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Google Urges Windows Users To Update Chrome Amid New Security Threats
The Developer’s Guide To Preventing Data Leaks & Breaches In Software »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

Regulus Cyber

Regulus Cyber

Regulus enables drones, robots and autonomous vehicles to operate safely, without malicious or accidental interference to the operation of their mission.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

Early Birds

Early Birds

Early Birds is a Business to Business (B2B) marketplace for Innovators (Startups/Scaleups) and Early Adopters to exchange value early on.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Park Place Technologies

Park Place Technologies

Park Place Technologies' mission is to drive uptime, performance and value for critical IT infrastructure.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.