WFM – COMMENX8 MARCH 23, 2024
Everyone remains fixated on the border watching the endless parade of foreign malcontents who’s intentions vary. We might proffer that aside from those that wish to take advantage of our generous social programs through either fraud of hostile intention there are others who’s infiltration is to undermine and destroy our republic, specifically agents of the Chinese Communist Party. The following article details their intent of establishing a ‘fifth column’ in the United States…
China’s Increasingly Aggressive Tactics for Foreign Disinformation Campaigns
THE DIPLOMATE
By Sara Cook September 18, 2023
On August 29, Meta reported that it had recently taken down thousands of accounts and Facebook pages that “were part of the largest known cross-platform covert operation in the world,” run by “geographically dispersed operators across China.” The announcement and its detailed analysis made headlines around the world, garnering attention for the type of information that is often mainly of interest to cybersecurity firms and digital policy wonks.
But such revelations are just the tip of the iceberg when it comes to Beijing’s evolving campaign to feed targeted disinformation – demonstrably false or misleading content, often through the use of fake accounts – to social media users around the world.
This reality reaffirms the findings of Freedom House’s “Beijing’s Global Media Influence” report, published last year, and demonstrates that democracies must invest more resources in the detection and mitigation of the Chinese regime’s disinformation efforts.
As they develop an appropriate response, policymakers, major technology companies, civil society researchers, and ordinary users should bear in mind the following features of Beijing’s latest disinformation practices…
To read more to to THE DIPLOMATE WEBSITE…
Good article. Of course, what appears missing here is a realistic look at the other side of the coin. Data hackers, who work for the U.S. government as an alternative to spending decades behind bars, are doing the same things to China, Russia, and Iran as they are doing (or attempting to do) to us. My question has always been, if our data hackers are so brilliant, then how is it possible for the “enemy” to compromise so many of our data systems?
It may well be assumed that perhaps those protecting our data systems may be themselves be compromised by our adversaries…Just a thought
Pingback: FORTUNE COOKIES ON DISPLAY - THE AMERICAN FINANCE ASSOCIATION