X Is A Vehicle For Political Propaganda

Two years after Elon Musk completed his controversial $44 billion takeover of Twitter in 2022, the platform has become a hotbed for the 2024 US Presidential election campaign, abounding with fake news, misinformation and disinformation, being made available to its 200 million users. 

Musk, who is reported to be one of the world's wealthiest men, bought Twitter, now called X, in a personal capacity. He has since relaxed policies on the moderation of the range and nature of content posted to the platform and and is widely thought to have tilted it in a more politically conservative direction.

In particular, his critics claim the platform has been used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

Musk is reported to have had secret talks with Russian President, Vladimir Putin and to have good business relations with with the government of China. He is on record as having contributed millions of dollars to Donald Trump's Presidential election campaign.

In case Trumps is re-elected, Musk is expected to join the Trump administration, possibly at Cabinet level, with direct influence over the conduct of US federal agencies.

The role of extremely wealthy individuals in US politics is hardly new, and Musk is not the only person whose great wealth has enabled them to seek influence over politics, business and foreign policy. Bill Gates, past-CEO and still a major investor in Microsoft (owner of the  LinkedIn social media platform) has donated $50million to Kamala Harris' election campaign. 

But few are working so publicly for a single candidate as Elon Musk, whose critics claim poses a test to the limits on one unelected person's political power, a consequences of the US Supreme Court's 2010 'Citizens United' decision which eliminated many of the previous legal limits on political donations. The critics also say that X has become a powerful, politically motivated weapon to poison the information environment, by filling it with dangerous, false, and unsubstantiated rumours about election fraud that can reach mass audiences. 

The real value of Musk's ownership of X is becoming apparent in the few days remaining before the polls close on November 5th.

A South-African born US citizen, Musk has personally intervened in British politics, posting and then deleting a fake headline that wrongly claimed Prime Minister Keir Starmer was considering sending anti-immigtration rioters to emergency prison camps in the distant Falkland Islands. 

The Atlantic   |   Fortune   |   Politico   |    ABC   |   NPR   |   LeMonde   |   Rolling Stone   |    New York Times

Image: Ideogram

You Might Also Read: 

X Blocked In Brazil By Supreme Court Order:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Google Urges Windows Users To Update Chrome Amid New Security Threats
The Developer’s Guide To Preventing Data Leaks & Breaches In Software »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Aware

Aware

Aware is the only comprehensive AI solution for governance, risk, compliance and insights for leading collaboration platforms.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

Inspectiv

Inspectiv

Inspectiv offers a turn-key solution to continuously identify security vulnerabilities and provide security assurance.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.

Codezero Technologies

Codezero Technologies

Codezero is at the forefront of microservices development, employing an identity-aware overlay network that delivers zero-trust security to DevOps.