Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Fake News and You
Many researchers believe that cyber propaganda campaigns rely on three factors in order to succeed in their mission: the tools and services used, social networking, and the motivation behind the campaign in question. Without any of these elements, spreading fake news becomes almost impossible.

Unfortunately, there are plenty of resources out there that can be used to spread a fake news campaign.

For instance, the Dark Web can provide those attempting to spread their propaganda with the tools they need to do so, safe behind a veil of anonymity. Social media offers platforms that encourage sharing, allowing what could be an exponential spread of a story with little hands-on effort from those responsible. Finally, while the majority of fake news that has been heard of as of late has been politically motivated, it can just as easily be used to manipulate businesses. In addition to its use as a political tool, fake news and information warfare can be used to promote a company and increase or decrease its stock--both financially and where public opinion is concerned.

China’s Fake News Marketplace
One example of the effects that fake news can have on businesses is demonstrated in the Chinese marketplace. One content distribution service, Xiezuobang, charges a user based on where the article is to be published. Services like this are easy to abuse for one’s own purposes.

Furthermore, aided by systems that enable public opinions to be measured and modified, posts can be automatically posted to 3000 websites at a rate of 100 posts per minute.

In addition to these tactics, many Chinese social networks are filled with posts shared by influential users who have been paid to promote that particular content. Based on that user’s popularity, the price of their content sharing services goes up.

A Global Problem
Of course, these practices are present in more areas than just China. Researchers have been able to collect and compare disinformation campaigns from the US, Russia, and Middle Eastern countries, and have resultantly been able to identify trends in what tools are used and how these campaigns are shaped to each region.

No matter where you are located, you need to keep an eye out for misinformation and cyber propaganda online. Whether it's politically motivated, or intended to manipulate business and the market, fake news is divisive and only benefits those that spread it.

What’s your opinion of fake news? Do you feel that it’s a real problem, or is it being overblown? Sound off in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 January 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Hackers Privacy Malware Email Business Internet Hosted Solutions Microsoft Computer Business Computing Windows 10 IT Services Backup Android Ransomware Software Smartphone Small Business Google User Tips Productivity Network Security Hardware Windows Browser Data Management Mobile Devices Data Business Continuity Phishing Internet of Things App Facebook Office 365 Upgrade Saving Money Smartphones Gmail Microsoft Office Cloud Computing IT Support Big Data Artificial Intelligence Word Data Recovery Managed Service Provider Outsourced IT Encryption Tip of the week Workplace Tips Managed IT Services Efficiency Remote Monitoring Office Tips Data storage Spam Miscellaneous Cybersecurity Social Media Money Disaster Recovery Government Firewall Customer Service Apple Two-factor Authentication Settings Windows 10 Server Content Filtering Robot Risk Management Employer-Employee Relationship IT Support Innovation WiFi Productivity Telephone Systems Save Money The Internet of Things Maintenance Chrome Analytics Data Backup SaaS Bandwidth Outlook IBM Antivirus Search Unified Threat Management Wireless Monitors Apps Customer Relationship Management Hacking Wi-Fi Administration Automation VoIP Password Passwords Mouse Presentation Hacker Avoiding Downtime Mobile Device Office Network Wireless Technology Recovery Scam Hosted Solution Tablet YouTube Vulnerability communications Holiday Business Management Printing Virtual Private Network Computing Google Drive End of Support Managed IT Services Safety LiFi IT Management Websites Windows 8 Halloween Black Friday Statistics Address Gadgets Google Wallet Virtual Reality Microsoft Excel Application Computers Virtualization User Error Quick Tips Scary Stories Cyber Monday Bluetooth Users Corporate Profile Drones Blockchain Display Printer VoIP Social Sports Smart Technology WannaCry Education Permissions Deep Learning Access Control Time Management Humor Cabling Hacks Distributed Denial of Service User Digital Payment Business Technology Data loss Budget Bring Your Own Device Competition SharePoint Network Management sip BYOD Infrastructure Buisness Managed IT Service Managed IT Fraud Lenovo Digital 5G IT solutions Best Practice Communication Downloads Computer Care Touchscreen telephony Disaster Vendor Management Break Fix Shortcut Mobile Security Cortana Superfish Marketing Spyware Business Growth Writing Multi-Factor Security Training Storage Automobile Uninterrupted Power Supply Current Events IP Address Downtime Dark Web Patch Management Hotspot Legal Alt Codes Retail Website Cybercrime Google Calendar Dark Data Solid State Drive Going Green Mobile Office Net Neutrality Language Hard Drives Knowledge Networking How To Typing Social Engineering Legislation Heating/Cooling IT service Computing Infrastructure Hard Disk Drive Mobile Device Management FCC VPN Refrigeration Experience Data Security Firefox Operating System Unified Communications Cryptocurrency Public Speaking Running Cable Comparison Servers Politics BDR Alerts Collaboration Lithium-ion battery Virtual Desktop Title II Techology Augmented Reality Google Maps Bitcoin How To Laptop Specifications Server Management Mail Merge File Sharing Information Technology Online Network Congestion Undo Unified Threat Management Google Docs Samsung Fun Identity Theft Travel G Suite Notifications Botnet Upgrades Supercomputer Motion Sickness Taxes Crowdsourcing Machine Learning 3D Printing IT Budget Emergency Update IT Consultant Relocation Unsupported Software Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Mobile Computing Point of Sale Black Market Law Enforcement Physical Security Paperless Office CrashOverride Twitter Staffing Gadget Administrator Personal Information Web Server Remote Computing Domains GPS Computer Repair Cameras Processors Tracking Health CCTV Alert Tech Support Document Management Licensing Electronic Medical Records