The era of speculation - Digital Threat Digest
PGI’s Digital Investigations Team brings you the Digital Threat Digest, SOCMINT and OSINT insights into disinformation, influence operations, and online harms.
PGI’s Digital Investigations Team brings you the Digital Threat Digest, SOCMINT and OSINT insights into disinformation, influence operations, and online harms.
I’m always curious about who starts conspiracy theories. Is it just one random person in their dark room on a computer with a light bulb moment and the power of the internet? How does it catch on? And are we all just engineered to speculate?
The latest conspiracy theory to rock our world is around the House of Windsor, and more specifically – Kate Middleton and the conspiracy theories over her health on social media. All of this started with Kate’s absence from the public after she was hospitalised for abdominal surgery for an unspecified condition in January. Seems pretty normal and understandable, but since then, the internet has come up with a plethora of reasons as to why she’s missing in action (other than the very plausible reason already given by the palace). To name a few: Kate Middleton has “pulled a gone girl”, she’s gotten BBL (Brazilian Butt Lift), and my ultimate favourite, Kate Middleton is Banksy because there hasn’t been a new piece of work released since her disappearance.
While all of this might seem entertaining, the reality is that the palace has had to issue formal statements because of these conspiracy theories, reiterating that Middleton is recovering from surgery and will return to public duties at the end of March.
We deal with the power of conspiracy theories when investigating the online world, and the psychology behind it has always been interesting to me. Conspiracy theories serve a crucial function of questioning the alleged ‘secret’ activities of those in power, in order to claim some power of their own. They can be linked to lack of trust in institutions and can help determine vulnerable groups in society. From our perspective as digital investigation analysts, they can highlight how information is generated, disseminated, and consumed, and most importantly, can help us map out central nodes in environments that might be responsible for polarising information environments.
Conspiracy theories do not only polarise information environments. They can be lucrative, creating targeted content aimed at amplifying themselves, and reaping in ad revenue from the traffic this generates on social media.
Furthermore, their increasing popularity and presence suggests that we are in an era of speculation, losing trust in everything and everyone. And maybe we have always been in this era – conspiracy theories aren’t new, but social media has made them more powerful. Recognising their power, understanding the flow of information, and trying to map out those at its centre form part of why researching conspiracy theories and monitoring information environments can help build information integrity and resilience.
More about Protection Group International's Digital Investigations
Our Digital Investigations Analysts combine modern exploitative technology with deep human analytical expertise that covers the social media platforms themselves and the behaviours and the intents of those who use them. Our experienced analyst team have a deep understanding of how various threat groups use social media and follow a three-pronged approach focused on content, behaviour and infrastructure to assess and substantiate threat landscapes.
Disclaimer: Protection Group International does not endorse any of the linked content.
Working within the Trust and Safety industry, 2024 has been PGI’s busiest year to date, both in our work with clients and our participation in key conversations, particularly around the future of regulation, the human-AI interface, and child safety.
At their core, artificial systems are a series of relationships between intelligence, truth, and decision making.
Feeding the name of a new criminal to the online OSINT community is like waving a red rag to a bull. There’s an immediate scramble to be the first to find every piece of information out there on the target, and present it back in a nice network graph (bonus points if you’re using your own network graph product and the whole thing is a thinly veiled advert for why your Ghunt code wrap with its purple-backlit-round-edged-dynamic-element CSS is better than everyone else’s).