X Is A Vehicle For Political Propaganda

Two years after Elon Musk completed his controversial $44 billion takeover of Twitter in 2022, the platform has become a hotbed for the 2024 US Presidential election campaign, abounding with fake news, misinformation and disinformation, being made available to its 200 million users. 

Musk, who is reported to be one of the world's wealthiest men, bought Twitter, now called X, in a personal capacity. He has since relaxed policies on the moderation of the range and nature of content posted to the platform and and is widely thought to have tilted it in a more politically conservative direction.

In particular, his critics claim the platform has been used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

Musk is reported to have had secret talks with Russian President, Vladimir Putin and to have good business relations with with the government of China. He is on record as having contributed millions of dollars to Donald Trump's Presidential election campaign.

In case Trumps is re-elected, Musk is expected to join the Trump administration, possibly at Cabinet level, with direct influence over the conduct of US federal agencies.

The role of extremely wealthy individuals in US politics is hardly new, and Musk is not the only person whose great wealth has enabled them to seek influence over politics, business and foreign policy. Bill Gates, past-CEO and still a major investor in Microsoft (owner of the  LinkedIn social media platform) has donated $50million to Kamala Harris' election campaign. 

But few are working so publicly for a single candidate as Elon Musk, whose critics claim poses a test to the limits on one unelected person's political power, a consequences of the US Supreme Court's 2010 'Citizens United' decision which eliminated many of the previous legal limits on political donations. The critics also say that X has become a powerful, politically motivated weapon to poison the information environment, by filling it with dangerous, false, and unsubstantiated rumours about election fraud that can reach mass audiences. 

The real value of Musk's ownership of X is becoming apparent in the few days remaining before the polls close on November 5th.

A South-African born US citizen, Musk has personally intervened in British politics, posting and then deleting a fake headline that wrongly claimed Prime Minister Keir Starmer was considering sending anti-immigtration rioters to emergency prison camps in the distant Falkland Islands. 

The Atlantic   |   Fortune   |   Politico   |    ABC   |   NPR   |   LeMonde   |   Rolling Stone   |    New York Times

Image: Ideogram

You Might Also Read: 

X Blocked In Brazil By Supreme Court Order:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Google Urges Windows Users To Update Chrome Amid New Security Threats
The Developer’s Guide To Preventing Data Leaks & Breaches In Software »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

National Institute of Standards & Technology (NIST) - USA

National Institute of Standards & Technology (NIST) - USA

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Yokogawa Electric

Yokogawa Electric

Yokogawa is an electrical engineering company providing measurement, control, and information technologies including industrial cyber security.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

Prompt

Prompt

Prompt supports the creation of partnerships and the setting up of industrial-institutional applied R&D projects for all ICT sectors.

ANSEC IA

ANSEC IA

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Kintent

Kintent

With Kintent, compliance becomes a habit, is simple to understand and achieve, and is continuously testable so that your customers can see that you are adhering to all your trust obligations.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.

Secher Security

Secher Security

Secher Security is a professional and secure partner with a high level of professional expertise in simplifying and optimizing complex IT infrastructures.