THEORETICAL ASPECTS IN THE FORMATION OF
PEDAGOGICAL SCIENCES
International scientific-online conference
31
THE MAIN MECHANISMS OF POLITICAL MANIPULATION
Takhmina Mamadalieva
Lecturer at the Department of Social Sciences,
Tashkent State Transport University,
Tashkent, Uzbekistan
mishel.96@bk.ru
https://doi.org/10.5281/zenodo.15003745
Abstract.
In the context of globalization, manipulative strategies are
becoming increasingly complex and influential. State and non-state actors
employ disinformation, fake news, cyberattacks, and algorithmic manipulation
to achieve political and economic objectives. These mechanisms shape false
narratives, undermine trust in authorities, and destabilize society, exacerbating
social polarization.
Keywords:
Political manipulation, disinformation, fake news, cyberattacks,
algorithms, public opinion, trust in authority.
In the context of globalization and the increasing flow of information,
manipulative strategies are becoming more sophisticated, and their
consequences more far-reaching. Modern technologies provide a wide range of
tools for manipulating public opinion. The relevance of this study is determined
by the fact that manipulative techniques are actively employed by both state and
non-state actors to achieve political and economic objectives. Disinformation,
fake news, cyberattacks, and algorithmic manipulation—all these mechanisms
have the potential to shape false narratives, influence political stability, and
undermine trust in governmental institutions. As a result, mass consciousness
becomes the target of deliberate influence, leading to shifts in political
preferences, the destabilization of social processes, and the intensification of
social polarization.
The dissemination of deliberately false information is one of the oldest tools
of political influence, which has taken on new significance in the digital age. A
study conducted by researchers at the Massachusetts Institute of Technology
(MIT) revealed that political fake news spreads three times faster on social
media than accurate reports. On average, false political news reaches an
audience of 20,000 people, whereas truthful information reaches only 10,000.
An analysis of retweets and reposts found that the probability of spreading false
information is approximately 70% higher compared to accurate data. Contrary
to popular belief, the primary drivers of disinformation dissemination are not
automated bots but real users, who are more likely to share sensational and
emotionally charged messages without verifying their accuracy. This
THEORETICAL ASPECTS IN THE FORMATION OF
PEDAGOGICAL SCIENCES
International scientific-online conference
32
phenomenon is driven by cognitive characteristics of information perception—
novelty and the shocking nature of fake news make it more appealing to mass
audiences.
Conspiracy theories and distorted interpretations of events, deliberately
disseminated to shape a false perception of reality, also fall into the category of
disinformation. Both state and non-state actors employ methods such as the
creation of troll farms, anonymous communities on social media, and the use of
propagandist media outlets to amplify disinformation. For instance, a report by
U.S. intelligence agencies on interference in the 2016 elections highlighted that
information campaigns combined covert cyber operations (database breaches,
leaks of confidential information) with the active use of propaganda through
state-controlled media and paid commentators on social networks. As a result,
false information about candidates, voter turnout, and election violations was
widely spread, influencing voters' perceptions.
An additional level of threat is posed by the development of artificial
intelligence technologies, particularly the creation of so-called deepfake
forgeries—hyper-realistic audio and video recordings that mimic the speech and
appearance of well-known individuals. These technologies enable the generation
of entirely false "evidence" of events or statements, challenging traditional
methods of information verification. The mass production of such fabrications
creates significant risks for democratic processes, necessitating the
development of new approaches for identifying and authenticating digital
content.
In the digital age, cyberattacks have evolved beyond tools of sabotage or
industrial espionage to become powerful instruments of political manipulation.
Unlike traditional hacking attacks aimed at data theft for extortion, politically
motivated cyberattacks are used to undermine trust in state institutions, spread
disinformation, and influence electoral processes.
One of the most high-profile examples is the cyberattack on Ukraine’s
Central Election Commission (CEC) in May 2014. A few days before the
presidential elections, a hacker group infiltrated the CEC network, deleting
critical files, which disrupted the vote-counting system. Although the data was
eventually restored, the CEC website was compromised again just before the
official announcement of the results—this time displaying false information
declaring victory for a candidate who, in reality, had received less than 1% of the
votes. Another example of cyber manipulation is the 2017 hack of Qatar’s state
news agency (QNA). The agency's website published fabricated statements
THEORETICAL ASPECTS IN THE FORMATION OF
PEDAGOGICAL SCIENCES
International scientific-online conference
33
attributed to the Emir of Qatar, in which he allegedly expressed conciliatory
remarks toward Iran and criticized neighboring Arab countries. As was later
revealed, these messages were planted by hackers, yet their dissemination
triggered an immediate and severe diplomatic reaction: several Middle Eastern
nations abruptly severed ties with Doha. The subsequent investigation
confirmed the cyber breach, demonstrating how a digital attack on a news
platform—through the publication of falsified content—can escalate into an
international crisis.
Such "hack-and-leak" or "hack-and-fake" operations have become a key
component of information warfare. In these campaigns, hackers either steal or
fabricate compromising information, which is then strategically disseminated
through media and social networks by the orchestrators of the manipulation,
presenting it in a way that serves their interests. One of the most well-known
cases of this tactic was the interference in the 2016 U.S. elections, where hackers
breached the email correspondence of Democratic Party officials and released it
to the public. Selected excerpts from these communications were later
manipulated and used to influence public opinion.
Thus, in modern conditions, cyberattacks have transcended traditional
threats to information security and have become a crucial instrument of political
struggle. Their capacity to destabilize state institutions, influence international
relations, and construct distorted narratives makes cyber manipulation one of
the most pressing challenges of the digital age.
Political manipulation in the digital age remains a significant challenge for
democratic societies. Protecting the information space requires a
comprehensive approach that includes the development of manipulation
detection technologies, legislative initiatives, and educational programs aimed at
fostering societal resilience to disinformation. Given the rapid advancement of
digital technologies, studying new forms of manipulation and developing
adaptive counterstrategies have become critically important tasks for political
science and national security systems.
Literature:
1.
Иванов П.А. Политическая манипуляция и общественное мнение //
Журнал политических исследований. – 2021. – №3. – С. 32-45.
2.
Vosoughi S., Roy D., Aral S. The spread of true and false news online //
Science. – 2018. – Vol. 359, Issue 6380. – P. 1146–1151.
3.
Allcott H., Gentzkow M. Social Media and Fake News in the 2016 Election
// Journal of Economic Perspectives. – 2017. – Vol. 31, Issue 2. – P. 211-236.
THEORETICAL ASPECTS IN THE FORMATION OF
PEDAGOGICAL SCIENCES
International scientific-online conference
34
4.
Сидоров В.Н. Политическая дезинформация в цифровую эпоху:
механизмы распространения и методы противодействия // Политическая
аналитика. – 2020. – №3. – С. 52-67.
5.
Office of the Director of National Intelligence. Assessing Russian Activities
and Intentions in Recent US Elections. – Washington D.C., 2017.
6.
Mirsky Y., Lee W., Shmatikov V. The Evolution of Deepfake Technology and
its Implications for Information Security // IEEE Transactions on Information
Forensics and Security. – 2021. – Vol. 16. – P. 3756-3772.
7.
Office of the Director of National Intelligence. Assessing Russian Activities
and Intentions in Recent US Elections. – Washington D.C., 2017.
8.
Zegart A. Spies, Lies, and Algorithms: The History and Future of American
Intelligence. – Princeton: Princeton University Press, 2022.
9.
Sanger D.E. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age.
– New York: Crown, 2018.
