X Is A Vehicle For Political Propaganda

Two years after Elon Musk completed his controversial $44 billion takeover of Twitter in 2022, the platform has become a hotbed for the 2024 US Presidential election campaign, abounding with fake news, misinformation and disinformation, being made available to its 200 million users. 

Musk, who is reported to be one of the world's wealthiest men, bought Twitter, now called X, in a personal capacity. He has since relaxed policies on the moderation of the range and nature of content posted to the platform and and is widely thought to have tilted it in a more politically conservative direction.

In particular, his critics claim the platform has been used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

Musk is reported to have had secret talks with Russian President, Vladimir Putin and to have good business relations with with the government of China. He is on record as having contributed millions of dollars to Donald Trump's Presidential election campaign.

In case Trumps is re-elected, Musk is expected to join the Trump administration, possibly at Cabinet level, with direct influence over the conduct of US federal agencies.

The role of extremely wealthy individuals in US politics is hardly new, and Musk is not the only person whose great wealth has enabled them to seek influence over politics, business and foreign policy. Bill Gates, past-CEO and still a major investor in Microsoft (owner of the  LinkedIn social media platform) has donated $50million to Kamala Harris' election campaign. 

But few are working so publicly for a single candidate as Elon Musk, whose critics claim poses a test to the limits on one unelected person's political power, a consequences of the US Supreme Court's 2010 'Citizens United' decision which eliminated many of the previous legal limits on political donations. The critics also say that X has become a powerful, politically motivated weapon to poison the information environment, by filling it with dangerous, false, and unsubstantiated rumours about election fraud that can reach mass audiences. 

The real value of Musk's ownership of X is becoming apparent in the few days remaining before the polls close on November 5th.

A South-African born US citizen, Musk has personally intervened in British politics, posting and then deleting a fake headline that wrongly claimed Prime Minister Keir Starmer was considering sending anti-immigtration rioters to emergency prison camps in the distant Falkland Islands. 

The Atlantic   |   Fortune   |   Politico   |    ABC   |   NPR   |   LeMonde   |   Rolling Stone   |    New York Times

Image: Ideogram

You Might Also Read: 

X Blocked In Brazil By Supreme Court Order:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Google Urges Windows Users To Update Chrome Amid New Security Threats
The Developer’s Guide To Preventing Data Leaks & Breaches In Software »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

TechInsurance

TechInsurance

TechInsurance is America's top technology insurance company offering a range of technology related products including Cyber Liability insurance.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

CyberGRX

CyberGRX

The CyberGRX Exchange and our risk assessments-as-a-service help Enterprises and Third Parties cost-effectively identify, prioritize and mitigate risk.

Safe Security

Safe Security

Safe Security (formerly Lucideus) provides Cyber risk assessment services and platforms to multiple Fortune 500 companies and governments across the globe.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

SBD Automotive

SBD Automotive

SBD Automotive are specialists in automotive technology providing independent research and consultancy to help create smarter, more secure, better connected, and increasingly autonomous cars.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

Mandiant

Mandiant

Mandiant deliver dynamic cyber defense solutions powered by industry-leading expertise, intelligence and innovative technology.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.