• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Social Media Influencer Charged with Election Interference

You are here: Home / General Cyber Security News / Social Media Influencer Charged with Election Interference

An American social media influencer has been charged with running a misinformation campaign that tricked social media customers into believing that they could vote by text message in the 2016 US presidential election.

Douglass Mackey, aka Ricky Vaughn, was arrested yesterday early morning on expenses of conspiring with other people in advance of the election to unfold misinformation intended to deprive US citizens of their constitutional appropriate to vote.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
F Secure Safe 2021

Protect yourself against all threads using F-Seure. F-Seure is one of the first security companies which has never been backed up by any governments. It provides you with an award-winning security plus an optimum privacy.

Get F-Secure Safe with 65% discount from a bitdefender official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Mackey, of West Palm Seaside, Florida, was charged by prison grievance in the Eastern District of New York and produced on a $50k bond. According to the complaint, the 31-calendar year-previous shared fraudulent messages encouraging supporters of a person of the presidential candidates to vote via textual content message or social media, a legally invalid technique of voting.

Amid the misinformation allegedly shared by Mackey was an graphic shared on November 1, 2016, on Twitter that confirmed an African American woman standing in front of an “African Individuals for Hillary Clinton” signal.  The impression incorporated the next text: “Avoid the Line. Vote from Household. Text ‘Hillary’ to 59925[.] Vote for Hillary and be a aspect of record.” 

Great print at the bottom of the impression stated “Must be 18 or older to vote. One particular vote per man or woman. Have to be a authorized citizen of the United States. Voting by textual content not available in Guam, Puerto Rico, Alaska or Hawaii. Compensated for by Hillary for President 2016.”

At minimum 4,900 one of a kind phone figures texted the name Hillary or some derivative to the 59925 selection. 

In 2016, Mackey experienced about 58,000 Twitter followers. A February 2016 analysis by the MIT Media Lab rated one of Mackey’s Twitter handles @Ricky_Vaughn99 as the 107th most crucial influencer of the then-upcoming election. 

By comparison, NBC News was rated #114, the Washington Article at #43, Vladimir Putin at #41, the musician Cher at #101, and Beau Biden at #63. 

“What Mackey allegedly did to interfere with this process—by soliciting voters to cast their ballots through text—amounted to nothing at all quick of vote theft,” stated William Sweeney Jr., assistant director in demand of the FBI’s New York Subject Workplace. 

“It is illegal habits and contributes to the erosion of the public’s believe in in our electoral procedures.”


Some sections of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Rocke Group’s Malware Now Has Worm Capabilities Rocke Group’s Malware Now Has Worm Capabilities

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Social Media Influencer Charged with Election Interference
  • Rocke Group’s Malware Now Has Worm Capabilities
  • Return to SMS as Security Feature
  • NetWalker ransomware mastermind indicted in Florida
  • US Launches Global Action Against NetWalker
  • Schneider Partners with Immersive Labs to Launch Virtual Training Platform
  • LogoKit Simplifies Office 365, SharePoint ‘Login’ Phishing Pages
  • McAfee’s MVISION XDR takes security beyond the endpoint
  • Mimecast Confirms SolarWinds Hack as List of Security Vendor Victims Snowball
  • #RSAC365: How to Achieve Next Level Security Automation

Copyright © TheCyberSecurity.News, All Rights Reserved.