Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Fake News and You
Many researchers believe that cyber propaganda campaigns rely on three factors in order to succeed in their mission: the tools and services used, social networking, and the motivation behind the campaign in question. Without any of these elements, spreading fake news becomes almost impossible.

Unfortunately, there are plenty of resources out there that can be used to spread a fake news campaign.

For instance, the Dark Web can provide those attempting to spread their propaganda with the tools they need to do so, safe behind a veil of anonymity. Social media offers platforms that encourage sharing, allowing what could be an exponential spread of a story with little hands-on effort from those responsible. Finally, while the majority of fake news that has been heard of as of late has been politically motivated, it can just as easily be used to manipulate businesses. In addition to its use as a political tool, fake news and information warfare can be used to promote a company and increase or decrease its stock--both financially and where public opinion is concerned.

China’s Fake News Marketplace
One example of the effects that fake news can have on businesses is demonstrated in the Chinese marketplace. One content distribution service, Xiezuobang, charges a user based on where the article is to be published. Services like this are easy to abuse for one’s own purposes.

Furthermore, aided by systems that enable public opinions to be measured and modified, posts can be automatically posted to 3000 websites at a rate of 100 posts per minute.

In addition to these tactics, many Chinese social networks are filled with posts shared by influential users who have been paid to promote that particular content. Based on that user’s popularity, the price of their content sharing services goes up.

A Global Problem
Of course, these practices are present in more areas than just China. Researchers have been able to collect and compare disinformation campaigns from the US, Russia, and Middle Eastern countries, and have resultantly been able to identify trends in what tools are used and how these campaigns are shaped to each region.

No matter where you are located, you need to keep an eye out for misinformation and cyber propaganda online. Whether it's politically motivated, or intended to manipulate business and the market, fake news is divisive and only benefits those that spread it.

What’s your opinion of fake news? Do you feel that it’s a real problem, or is it being overblown? Sound off in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Hackers Malware Business Business Computing Internet Hosted Solutions Computer Microsoft Software Backup Windows 10 Ransomware IT Services Network Security Android Mobile Devices Smartphone Google User Tips Data Management Hardware Small Business Browser Productivity Windows Business Continuity Cloud Computing Server Gmail Data Artificial Intelligence Internet of Things Managed Service Provider Phishing App Encryption Facebook Office 365 Upgrade Smartphones Saving Money Efficiency Data Recovery Microsoft Office Big Data Spam Tip of the week Disaster Recovery Social Media Word Business Management Managed IT Services Remote Monitoring Data Backup Workplace Tips Innovation Government Office Tips Infrastructure Outsourced IT IT Support Windows 10 Money Miscellaneous Firewall IT Support Customer Service Tech Term Apple Settings Passwords IT Management Content Filtering Productivity Two-factor Authentication Robot Risk Management Antivirus Cybersecurity Employer-Employee Relationship Chrome Communication WiFi Data storage The Internet of Things Bandwidth Outlook Search Scam Tablet Vulnerability Administration IBM Wireless VoIP Holiday VPN Password Apps Customer Relationship Management Data Security Mouse Wi-Fi Hacking Virtual Private Network Network End of Support Storage Server Management Managed IT Services Presentation Hosted Solution Hacker Avoiding Downtime Save Money Telephone Systems Office Virtual Reality Maintenance YouTube Wireless Technology communications Recovery SaaS Printing Website Unified Threat Management Computing Monitors Google Drive Business Technology HIPAA Data loss Automation LiFi BYOD Augmented Reality Analytics Safety Mobile Security Mobile Device Superfish IT Technicians Drones Spyware Writing Application Training Gadgets Multi-Factor Security Cookies Automobile Dark Web Patch Management Hotspot Social Uninterrupted Power Supply Sports Virtualization Paperless Office Mirgation Education Humor Retail Deep Learning Users Google Calendar Nanotechnology Net Neutrality Language Hacks Solid State Drive Remote Computing Networking Chatbots Budget How To sip Social Engineering Heating/Cooling Bring Your Own Device IT service Legislation FCC Computing Infrastructure Hard Disk Drive Buisness IT solutions User Identity Firefox telephony Servers Best Practice BDR Politics Comparison Collaboration Title II Alerts Competition Cortana Techology Specifications How To Business Growth 5G Google Maps Document Management Tech Support File Sharing Online Mail Merge Licensing Current Events Downtime Samsung Unified Threat Management Compliance Legal Network Congestion Black Friday Dark Data Statistics Alt Codes Cybercrime Identity Theft Marketing Websites Microsoft Excel Address Cooperation Going Green Quick Tips IP Address Knowledge User Error Regulations Computers Cyber Monday Bluetooth Typing Blockchain Staff Corporate Profile Display VoIP Unified Communications Mobile Office Experience Printer Social Networking Operating System Smart Technology Cryptocurrency Running Cable Hard Drives Permissions Wearable Technology WannaCry Virtual Desktop Time Management Mobile Device Management Access Control Motherboard Distributed Denial of Service Bitcoin Cabling Laptop Refrigeration Digital Payment Information Technology Public Speaking Network Management Lithium-ion battery SharePoint Router Google Docs Managed IT Service Managed IT Fraud Windows 8 Halloween Lenovo Applications Google Wallet Digital Touchscreen Computer Care Downloads Modem Break Fix Vendor Management Shortcut Fun Disaster Scary Stories Undo Point of Sale Black Market Law Enforcement Physical Security Twitter CrashOverride Staffing Gadget Administrator Personal Information Web Server Screen Reader GPS Computer Repair Cameras Processors Smart Tech Tracking Health Mobile Computing CCTV Alert Connectivity Electronic Medical Records Travel G Suite Notifications Botnet Upgrades Supercomputer Motion Sickness Taxes Crowdsourcing Machine Learning 3D Printing IT Budget Update Emergency Domains IT Consultant Relocation Unsupported Software Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error