{"id":15417,"date":"2022-11-04T11:43:34","date_gmt":"2022-11-04T03:43:34","guid":{"rendered":"https:\/\/newmalaysiatimes.com\/?p=15417"},"modified":"2022-11-04T11:43:36","modified_gmt":"2022-11-04T03:43:36","slug":"data-manipulation-ahead-of-polls-may-shift-electoral-mindset","status":"publish","type":"post","link":"https:\/\/newmalaysiatimes.com\/?p=15417","title":{"rendered":"Data manipulation ahead of polls may shift electoral mindset"},"content":{"rendered":"\n<p><strong>KUALA LUMPUR, Nov 4<\/strong> &#8212; Political surveys are crucial to any election process as they form the basis of the research on which the campaign revolves.<\/p>\n\n\n\n<p>But be warned, some of these surveys also manipulate, helping to shape thoughts and shifting voter mindset, experts said.<\/p>\n\n\n\n<p>Respondents are likely to receive calls from individuals introducing themselves from a certain political party to assess their preference to vote for a party or candidate running for election.<\/p>\n\n\n\n<p>Among the questions asked, \u201cDo you know which area you\u2019ll be voting? Who will you vote? Do you know that you are entitled to some allocation (money) if you vote for this party?\u201d<\/p>\n\n\n\n<p>With the 15th general election (GE15) fever heating up, some questions come to mind, how do you distinguish between a genuine call from a political party conducting an opinion poll and from a syndicate or a scammer in disguise?<\/p>\n\n\n\n<p>Obviously, some questions are mind-boggling: how did they manage to obtain your data as voter including your telephone number?<\/p>\n\n\n\n<p>These are issues of concerns among electorates ahead of the GE15 to be held on Nov 19, when their personal data are indiscriminately accessed and manipulated by quarters with vested interests.<\/p>\n\n\n\n<p><strong>VOTERS, RISKY CANDIDATES<\/strong><\/p>\n\n\n\n<p>Deputy President of the Malaysian Cyber Consumer Association (MCCA) Azrul Zafri Azmi said data trading is usually rife with election season in the air, and those involved will obtain the data required including through surveys for political analysis purposes.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-1024x638.png\" alt=\"manipulation\" class=\"wp-image-15418\" width=\"663\" height=\"413\" srcset=\"https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-1024x638.png 1024w, https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-300x187.png 300w, https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-768x478.png 768w, https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-1536x957.png 1536w, https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-161x100.png 161w, https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-350x218.png 350w, https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-800x498.png 800w, https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM.png 1808w\" sizes=\"auto, (max-width: 663px) 100vw, 663px\" \/><\/figure><\/div>\n\n\n<p><em>\u201cThe information could be very detailed such as full name, home address, phone number, identification card number and voting area.&#8221;<\/em><\/p>\n\n\n\n<p><em>\u201cThe information is believed to have been accessed from a telco and last year, news went viral that personal data of customers were (allegedly) leaked through the Inland Revenue Department (LHDN) and the National Registration Department (JPN).&#8221;<\/em><\/p>\n\n\n\n<p><em>\u201cInvestigation into such an allegation must be conducted immediately and in a transparent manner to prevent more leakages and indiscriminate trading of data. The authorities should probe individuals who are involved in the system maintenance and database servers,\u201d<\/em> he told Bernama recently.<\/p>\n\n\n\n<p>However, LHDN in a statement has denied being involved in the alleged leak of personal data of four million Malaysians through a government platform under the purview of JPN.<\/p>\n\n\n\n<p><em>\u201cFor your information, LHDN is only a user and not the owner of the myIDENTITY system,\u201d<\/em> it said, according to a Bernama report on Sept 28, 2021.<\/p>\n\n\n\n<p>Following the allegation, the agency said an internal investigation had found no such leak.<\/p>\n\n\n\n<p>Describing customers\u2019 data as an invaluable commodity in today\u2019s digital world, Azrul Zafri said the information is used for analysing an individual\u2019s behaviour for commercial and political purposes as well as by fraud syndicates.<\/p>\n\n\n\n<p><em>\u201cIn the context of elections, be it electoral or candidates\u2019 data, both have risks. Voters\u2019 data can be sold to a political party to determine the effectiveness of its campaign, while candidates\u2019 data is also saleable to opponent parties to take advantage of personal weaknesses during the campaign,\u201d<\/em> he explained.<\/p>\n\n\n\n<p><strong>POLITICAL, PERSONAL GAINS<\/strong><\/p>\n\n\n\n<p>The high demand for the data contributed to a surge in trading of information for manipulation for political, business, fraud and other nefarious activities.<\/p>\n\n\n\n<p>While the trading process is usually related to the dark web, there are also quarters who undertake such operations in the open market such as online forums.<\/p>\n\n\n\n<p>For example, the Ministry of Communications and Multimedia (K-KOMM) on June 14 this year issued an order to internet service providers (ISPs) to block the sale of data on an open-source intelligence website.<\/p>\n\n\n\n<p>Its minister Tan Sri Annuar Musa said the order was issued around 6.30 pm, the same day after the website and it activities were exposed on Twitter in the morning of June 12.<\/p>\n\n\n\n<p>Azrul Zafri said data leakage poses risks for internet users to various crime activities including Macau Scam, mule account syndicates and various fraudulent activities which could result in financial losses as well as endanger their lives.<\/p>\n\n\n\n<p><em>\u201cInternet is an effective medium to a wealth of information such as education, business, etc.&#8221;<\/em><\/p>\n\n\n\n<p><em>\u00a0\u201cHowever, users must be given early education on the best platform to use without exposing to their own risks especially in matters related to personal data,\u201d<\/em> he said, adding that cyber education is their last line of defence against scammers and \u00a0from being manipulated by unscrupulous people.<\/p>\n\n\n\n<p><strong>IOT, IR 4.0 ERA<\/strong><\/p>\n\n\n\n<p>Meanwhile Prof Dr Mohd Mizan Mohammad Aslam of &nbsp;the Department of International Relations, Security and Law, Faculty of Defence Studies and Management, National Defence University of Malaysia (UPNM) said manipulation of data&nbsp;is rampant in today\u2019s Internet of Things (IoT) era.<\/p>\n\n\n\n<p><em>\u201cThe phenomenon is becoming prevalent during the \u00a0Industrial Revolution 4.0 (IR 4.0) or the 5G technology evolution, bringing about an information overload especially on the social media and the internet. As a result, users are unable to differentiate between true and false information.&#8221;<\/em><\/p>\n\n\n\n<p><em>\u201cAt the same time, we have become a community who will only read, listen and focus on what really matters and reject (information) that we\u2019re not interested in. This situation is what is known as echo chamber, and that is why many tend to be susceptible to false or fake information,\u201d<\/em> he said.<\/p>\n\n\n\n<p>According to him, several quarters especially those directly involved in the elections will use various tactics to win seats by swaying public opinion as opposed to making a decision towards a political party or group.<\/p>\n\n\n\n<p>He said trends of data manipulation were seen in elections in the United States, Russia and more recently in the Philippines, which saw electoral decisions largely influenced by data or information harvested from various platforms.<\/p>\n\n\n\n<p><strong>MODUS OPERANDI<\/strong><\/p>\n\n\n\n<p>Data manipulators usually buy information available from various platforms including Meta, which has control over personal data and information through Facebook, Instagram and other social media.<\/p>\n\n\n\n<p>There are also groups who take the easy and quick route by stealing data from various platforms. This way, they do not have to seek approval from any parties and that they are not legally bound by any restrictions.<\/p>\n\n\n\n<p>Mohd Mizan said among the widely used methods include profiling, which refers to collecting and gathering related data from various sources and they are kept for certain purposes.<\/p>\n\n\n\n<p><em>\u201cAs examples, the period an individual uses the internet, social friends and topics of interest, websites they surf or programmes they watch. Profiling will be made based on the type of information obtained and from the data, they will know the pattern or mindset of an individual, community as well as the nation.&#8221;<\/em><\/p>\n\n\n\n<p><em>\u201cData manipulation can happen to anyone including the majority or what is known as bottom million or large community. It can happen to the top few groups. Both groups risk being used by certain groups to achieve their goals,\u201d<\/em> he added.<\/p>\n\n\n\n<p>Data is secretly traded either on certain websites or among hackers who have their own community, are inter-connected and engage in exchange of information required.<\/p>\n\n\n\n<p><em>\u201cTheir groups (hackers) are strong, devious and well guarded and it would be difficult for a (data) security (personnel) to stop their activities unless they work together or become part of their operation.&#8221;<\/em><\/p>\n\n\n\n<p><em>\u201cHackers reap profits from data that are sold and are usually in great demand especially from today\u2019s borderless world.&#8221;<\/em><\/p>\n\n\n\n<p><em>\u201cHowever, those who buy data are not doing it blindly, but with a certain purpose and the data is manipulated as much as possible and finally generating profits for them, such as when winning elections,\u201d<\/em> he said adding that, high value data is based on the difficulty of obtaining the information.<\/p>\n\n\n\n<p><strong>ESIM THEORY<\/strong><\/p>\n\n\n\n<p>Data manipulation is used as a vehicle to change public perception, mindset and understanding through modification. The modification technique is used to provide better information about a candidate in an election.<\/p>\n\n\n\n<p>\u201cPublic perception of a candidate is based on data made available to them. Hence, the individual with favourable data and information will automatically be the voters\u2019 choice.<\/p>\n\n\n\n<p><em>\u201cIn the past, character assassination was used by slandering an individual with the intention of destroying public confidence in the person through smear campaigns in the print media, to the extent of \u2018physically abusing\u2019 the individual.&#8221;<\/em><\/p>\n\n\n\n<p><em>\u201cHowever today, the social media is widely used to launch manipulative campaigns on various issues, causing the public to reject and despise an individual, hence having an impact on the election results,\u201d<\/em> he said adding that data manipulation is likely to poison the minds of the people.<\/p>\n\n\n\n<p>He said the data manipulation phenomena is linked to the theory of Elaborated Social Identity Model (ESIM) on crowd behaviour, noting that its objective is to access data and influence the psychology as well as the social behaviour of the community.<\/p>\n\n\n\n<p>He also said that the approach has proven to be effectively used in several studies including the elections and for better understanding of issues related to war.<\/p>\n\n\n\n<p><strong>THREATS, LEGAL EMPOWERMENT<\/strong><\/p>\n\n\n\n<p>On a wider perspective, data manipulation risks threats from the social aspects, political stability, economy and national security, when secret and sensitive data is used as a \u2018weapon\u2019 for certain groups to weaken the people and the nation.<\/p>\n\n\n\n<p><em>\u201cAs an example, information from a phone conversation between the Prime Minister with an individual including from abroad with issues centred on policies, international relations, intelligence information, overseas operations, etc, if exposed, would automatically be unsafe for the nation and place it as the subject of intrusion.&#8221;<\/em><\/p>\n\n\n\n<p><em>\u201cOn the election issue, when a data is manipulated, political decisions made would definitely be different from their previous considerations.&#8221;<\/em><\/p>\n\n\n\n<p><em>\u201cLeaders who are chosen are no longer based on merit, but due to their success in championing certain issues effectively, hence, winning the hearts and minds of the people,\u201d <\/em>he said adding that the matter is feared to have negative long-term implications including issues on ethnic conflict and religion.<\/p>\n\n\n\n<p>All quarters need to strengthen their data defence system at least reducing the risks of attacks, he said, noting that data manipulation and attacks would worsen and that the people may not be able to &nbsp;distinguish between genuine and fake information after the 5G technology has been widely disseminated.<\/p>\n\n\n\n<p><em>\u201cThe scope of technology\u2019s expanse is so great. As long as there is demand and buying and selling of data, manipulation and leakage of information will take place. We can\u2019t avoid from using technology but we can educate the public to be more responsible.&#8221;<\/em><\/p>\n\n\n\n<p><em>\u00a0\u201cLaws and existing acts need to be empowered and fully utilised in every issue related to manipulation or leakage of customers\u2019 data,\u201d<\/em> he added.<\/p>\n\n\n\n<p>In this respect, he said, the Personal Data Protection Act 2010 as an example can be read together with the Communications and Multimedia Act 1998, the Official Secrets Act 1972, Defamation Act 1957 and others, to give individuals the right to exercise control over how their data is used and prevent data leakage and misuse.<\/p>\n\n\n\n<p><a href=\"https:\/\/newmalaysiatimes.com\/\">NMT<\/a> as reported by <a href=\"https:\/\/www.bernama.com\/en\/features\/news.php?id=2134677\">Bernama<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>KUALA LUMPUR, Nov 4 &#8212; Political surveys are crucial to any election process as they&#8230;<\/p>\n","protected":false},"author":1,"featured_media":15418,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[524,15,19],"tags":[],"class_list":["post-15417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nation","category-politics","category-social"],"featured_image_urls":{"full":["https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM.png",1808,1126,false],"thumbnail":["https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-150x150.png",150,150,true],"medium":["https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-300x187.png",300,187,true],"medium_large":["https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-768x478.png",640,398,true],"large":["https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-1024x638.png",640,399,true],"1536x1536":["https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM-1536x957.png",1536,957,true],"2048x2048":["https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM.png",1808,1126,false],"newsium-slider-full":["https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM.png",1280,797,false],"newsium-featured":["https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM.png",1024,638,false],"newsium-medium":["https:\/\/newmalaysiatimes.com\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-04-at-11.42.10-AM.png",720,448,false]},"author_info":{"info":["Editor"]},"category_info":"<a href=\"https:\/\/newmalaysiatimes.com\/?cat=524\" rel=\"category\">Nation<\/a> <a href=\"https:\/\/newmalaysiatimes.com\/?cat=15\" rel=\"category\">Politics<\/a> <a href=\"https:\/\/newmalaysiatimes.com\/?cat=19\" rel=\"category\">Social<\/a>","tag_info":"Social","comment_count":"0","_links":{"self":[{"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=\/wp\/v2\/posts\/15417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15417"}],"version-history":[{"count":1,"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=\/wp\/v2\/posts\/15417\/revisions"}],"predecessor-version":[{"id":15419,"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=\/wp\/v2\/posts\/15417\/revisions\/15419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=\/wp\/v2\/media\/15418"}],"wp:attachment":[{"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newmalaysiatimes.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}