Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Fake News and You
Many researchers believe that cyber propaganda campaigns rely on three factors in order to succeed in their mission: the tools and services used, social networking, and the motivation behind the campaign in question. Without any of these elements, spreading fake news becomes almost impossible.

Unfortunately, there are plenty of resources out there that can be used to spread a fake news campaign.

For instance, the Dark Web can provide those attempting to spread their propaganda with the tools they need to do so, safe behind a veil of anonymity. Social media offers platforms that encourage sharing, allowing what could be an exponential spread of a story with little hands-on effort from those responsible. Finally, while the majority of fake news that has been heard of as of late has been politically motivated, it can just as easily be used to manipulate businesses. In addition to its use as a political tool, fake news and information warfare can be used to promote a company and increase or decrease its stock--both financially and where public opinion is concerned.

China’s Fake News Marketplace
One example of the effects that fake news can have on businesses is demonstrated in the Chinese marketplace. One content distribution service, Xiezuobang, charges a user based on where the article is to be published. Services like this are easy to abuse for one’s own purposes.

Furthermore, aided by systems that enable public opinions to be measured and modified, posts can be automatically posted to 3000 websites at a rate of 100 posts per minute.

In addition to these tactics, many Chinese social networks are filled with posts shared by influential users who have been paid to promote that particular content. Based on that user’s popularity, the price of their content sharing services goes up.

A Global Problem
Of course, these practices are present in more areas than just China. Researchers have been able to collect and compare disinformation campaigns from the US, Russia, and Middle Eastern countries, and have resultantly been able to identify trends in what tools are used and how these campaigns are shaped to each region.

No matter where you are located, you need to keep an eye out for misinformation and cyber propaganda online. Whether it's politically motivated, or intended to manipulate business and the market, fake news is divisive and only benefits those that spread it.

What’s your opinion of fake news? Do you feel that it’s a real problem, or is it being overblown? Sound off in the comments!

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 18 July 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Internet Hosted Solutions Windows 10 Software Backup Computer Ransomware IT Services Managed Service Provider Network Security Mobile Devices Android Smartphone Managed IT services User Tips Google IT Support Workplace Tips Social Media Outsourced IT Hardware Browser Communication Business Continuity Efficiency Disaster Recovery Data Management App Data Backup Smartphones Innovation Small Business Office Business Management Upgrade Holiday Cloud Computing Data Internet of Things Facebook Remote Monitoring Data Recovery Miscellaneous WiFi Server Office 365 Microsoft Office Windows Encryption Spam Artificial Intelligence Network Gmail Big Data Firewall Password Robot Apps Save Money Phishing Paperless Office Hosted Solution Recovery Productivity Bandwidth Customer Service Mobile Device Management How To Content Filtering Saving Money Government Remote Computing Money Infrastructure Work/Life Balance Customer Relationship Management Tech Term Office Tips Passwords Chrome Tip of the week Employer-Employee Relationship Document Management Risk Management Cybersecurity Apple Avoiding Downtime Word Unified Threat Management Managed IT Services Hacker Computing IT Management Education Operating System Cybercrime Antivirus Virtual Reality Mobile Device VoIP Managed IT Presentation Business Growth Data loss SaaS BYOD Social BDR Website Wi-Fi Outlook Windows 10 Compliance Telephone Systems File Sharing Two-factor Authentication Settings Analytics Vendor Management Data Security Health Applications The Internet of Things Computers IT Support Alert Hacking Mobile Computing Data storage Tech Support Search Maintenance Bring Your Own Device Digital Payment Sports Storage IT service Information Technology Cortana Humor Virtualization Computer Care Administration Project Management Analyitcs Training IT solutions Safety Business Technology Tablet Wireless Technology Automobile Upgrades Wireless Budget Downtime End of Support Specifications communications Mouse YouTube Patch Management Collaboration Unified Communications User Legal Scam Retail Vulnerability LiFi Regulations Twitter Politics Monitors Best Practice VPN Travel Lithium-ion battery Google Drive Business Owner Identity Theft Websites Automation Virtual Private Network Smart Technology Physical Security Augmented Reality Going Green Marketing Taxes Assessment Server Management Botnet IBM HIPAA Running Cable Printing Samsung Mobile Security Licensing Competition Modem Address Managed IT Service Meetings Computer Repair Notifications Geography Undo Proactive IT Hotspot Cleaning Bluetooth Comparison Relocation Software Tips eWaste IP Address Mirgation Google Wallet Cookies Redundancy Break Fix IT Sevices Webcam Corporate Profile Alt Codes Electronic Medical Records Crowdsourcing Dark Data Cables IT Consulting Language Quick Tips Printer Black Friday Private Cloud Environment Mobile Office Migration Drones Nanotechnology Dark Web Point of Sale WannaCry Typing Buisness Wires Data Breach Computing Infrastructure Time Management Access Control Cyber Monday Error Cabling Troubleshooting Chatbots Knowledge IoT Data Warehousing Cryptocurrency Technology Laws Alerts Network Management SharePoint Phone System flu season Identity Experience Utility Computing Lenovo Microsoft Excel Web Server VoIP Bitcoin Update Staffing Unified Threat Management Cooperation Touchscreen Downloads Shortcut Fort Worth Administrator Disaster 3D Printing Healthcare Superfish Blockchain Cameras Digital Windows 8 Chromebook GPS Law Enforcement Google Maps Network Congestion Domains business communications systems Staff Multi-Factor Security Entrepreneur flu shot Uninterrupted Power Supply Unsupported Software 5G Cost Management Application Permissions CCTV Spyware Emoji Tracking Gadget Users Display Public Speaking Internet Protocol Flexibility Google Calendar Fort Worth IT Solid State Drive Mobile Data iPhone Hacks Management Networking Fraud How To VoIP streamlines Operations Heating/Cooling Legislation Social Networking DFW IT Service Hard Disk Drive Current Events Laptop Enterprise Resource Planning Hard Drives Net Neutrality G Suite Firefox Processors Servers Virtual Desktop business network infrastructure Wearable Technology Motherboard Motion Sickness Supercomputer Halloween Google Docs Mobile Refrigeration Techology Internet Exlporer Software as a Service Help Desk Writing data services PowerPoint Router Mail Merge Distributed Denial of Service Deep Learning Personal Information Fun IT Budget Scary Stories Vulnerabilities Consumers Disaster Resistance IT Consultant Consultation Statistics Technology Tips Machine Learning Social Engineering User Error IT Technicians

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code