Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Fake News and You
Many researchers believe that cyber propaganda campaigns rely on three factors in order to succeed in their mission: the tools and services used, social networking, and the motivation behind the campaign in question. Without any of these elements, spreading fake news becomes almost impossible.

Unfortunately, there are plenty of resources out there that can be used to spread a fake news campaign.

For instance, the Dark Web can provide those attempting to spread their propaganda with the tools they need to do so, safe behind a veil of anonymity. Social media offers platforms that encourage sharing, allowing what could be an exponential spread of a story with little hands-on effort from those responsible. Finally, while the majority of fake news that has been heard of as of late has been politically motivated, it can just as easily be used to manipulate businesses. In addition to its use as a political tool, fake news and information warfare can be used to promote a company and increase or decrease its stock--both financially and where public opinion is concerned.

China’s Fake News Marketplace
One example of the effects that fake news can have on businesses is demonstrated in the Chinese marketplace. One content distribution service, Xiezuobang, charges a user based on where the article is to be published. Services like this are easy to abuse for one’s own purposes.

Furthermore, aided by systems that enable public opinions to be measured and modified, posts can be automatically posted to 3000 websites at a rate of 100 posts per minute.

In addition to these tactics, many Chinese social networks are filled with posts shared by influential users who have been paid to promote that particular content. Based on that user’s popularity, the price of their content sharing services goes up.

A Global Problem
Of course, these practices are present in more areas than just China. Researchers have been able to collect and compare disinformation campaigns from the US, Russia, and Middle Eastern countries, and have resultantly been able to identify trends in what tools are used and how these campaigns are shaped to each region.

No matter where you are located, you need to keep an eye out for misinformation and cyber propaganda online. Whether it's politically motivated, or intended to manipulate business and the market, fake news is divisive and only benefits those that spread it.

What’s your opinion of fake news? Do you feel that it’s a real problem, or is it being overblown? Sound off in the comments!


No comments yet
Already Registered? Login Here
Sunday, 22 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Business Computing Malware Productivity Business Email Microsoft Internet Windows 10 Hosted Solutions Backup Computer IT Services Ransomware Software Managed Service Provider Network Security Android Smartphone Mobile Devices User Tips Google Managed IT services IT Support Workplace Tips Social Media Hardware Browser Communication Business Continuity Efficiency Outsourced IT Disaster Recovery Data Management App Smartphones Innovation Small Business Office Business Management Cloud Computing Upgrade Holiday Data Windows Remote Monitoring Facebook Miscellaneous WiFi Server Data Backup Office 365 Microsoft Office Artificial Intelligence Gmail Big Data Internet of Things Encryption Spam Network Data Recovery Firewall Password Apps Phishing Hosted Solution Recovery Robot Work/Life Balance Infrastructure Word Customer Service Mobile Device Management Hacker Productivity Tip of the week Saving Money Content Filtering Remote Computing Cybersecurity Unified Threat Management Office Tips Passwords Chrome How To Employer-Employee Relationship Government Risk Management Save Money Apple Money Paperless Office Avoiding Downtime Hacking Computers Mobile Computing Tech Term Tech Support Bandwidth Windows 10 Operating System Education Telephone Systems Vendor Management Cybercrime Document Management VoIP Presentation Applications Business Growth Data Security Alert IT Support Social Customer Relationship Management Data storage Managed IT Services Outlook Website Wi-Fi Computing IT Management Two-factor Authentication Virtual Reality Settings Antivirus Health SaaS Mobile Device Analytics BYOD Managed IT Data loss The Internet of Things Augmented Reality Budget Tablet End of Support Running Cable IBM Competition Mouse Collaboration Search Information Technology Legal Bring Your Own Device Sports IT service File Sharing Humor Scam Cortana Twitter Politics Virtualization Vulnerability Monitors Administration Travel Analyitcs Google Drive Websites VPN Automation Physical Security Going Green Identity Theft IT solutions Safety Taxes HIPAA Botnet Wireless Technology Virtual Private Network Printing Specifications Wireless Mobile Security Samsung Server Management Downtime communications User Storage Licensing Maintenance YouTube Digital Payment Unified Communications Computer Care Retail Best Practice LiFi Training Lithium-ion battery Business Owner Project Management Automobile Marketing Business Technology Upgrades Web Server Microsoft Excel Technology Laws Update PowerPoint Network Management Halloween Cooperation Refrigeration Downloads 3D Printing VoIP Staffing Administrator Consumers Fort Worth Lenovo Cameras Fun Blockchain Unified Threat Management Chromebook Touchscreen BDR Deep Learning Scary Stories Staff Law Enforcement Multi-Factor Security Shortcut Network Congestion Disaster Unsupported Software Digital GPS Compliance flu shot Superfish CCTV eWaste Permissions business communications systems Emoji Google Maps Flexibility Gadget Undo Google Calendar Patch Management Display IT Sevices Uninterrupted Power Supply Mobile Data Spyware Hacks Tracking Regulations IP Address Fort Worth IT Environment Fraud Internet Protocol Alt Codes Operations Legislation Solid State Drive DFW IT Service Networking How To Current Events Social Networking Mobile Office G Suite Troubleshooting Net Neutrality VoIP streamlines Processors Heating/Cooling Typing Hard Disk Drive Buisness Wearable Technology Smart Technology Firefox Motherboard Motion Sickness Knowledge Internet Exlporer business network infrastructure Phone System Servers Google Docs Cryptocurrency Software as a Service Writing Distributed Denial of Service Techology Personal Information Assessment Supercomputer Router Bitcoin IT Consultant Experience data services Help Desk IT Technicians Machine Learning Technology Tips Mail Merge Social Engineering Managed IT Service Disaster Resistance Computer Repair Consultation IT Budget Modem Meetings Windows 8 Cleaning Hotspot User Error Notifications Statistics Mirgation Relocation Domains Comparison Address 5G Break Fix Proactive IT Electronic Medical Records Entrepreneur Google Wallet Cookies Webcam iPhone Language Crowdsourcing Application Printer Bluetooth Dark Data Software Tips Corporate Profile Users Migration Private Cloud Public Speaking Black Friday Redundancy Dark Web IT Consulting Quick Tips Drones Nanotechnology Point of Sale Computing Infrastructure Access Control WannaCry Chatbots Error Cyber Monday Data Warehousing Data Breach Time Management Laptop Alerts Hard Drives SharePoint Cabling Virtual Desktop Identity flu season

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...