{"id":31689,"date":"2013-12-02T14:10:51","date_gmt":"2013-12-02T22:10:51","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=31689"},"modified":"2025-08-18T00:57:18","modified_gmt":"2025-08-18T07:57:18","slug":"social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/","title":{"rendered":"Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!"},"content":{"rendered":"<p>An Indian investigative portal\u00a0<a href=\"https:\/\/cobrapost.com\/\">Cobrapost<\/a>, recently\u00a0released a report\u00a0on alleged online reputation smearing\/management\/campaigns designed to gain\/destroy political capital for who ever was the highest bidder or \u201ccustomer\u201d. Online world (social media) was abuzz with political motivations, and some where perplexed if\u00a0it was even possible (amazed, surprised, dismissive etc.)<\/p>\n<p>Some of the bloggers\/twitterati offered their own explanations, instantly building near myths and false narratives in the process. My attempt is to disabuse readers from such false narratives and myths. I would skip political aspects of this conversation and \u00a0focus on technological aspects.<\/p>\n<h2><strong>Myth 1<\/strong>\u00a0\u2013\u00a0<strong>It is not possible to have fake followers on either Facebook or Twitter.<\/strong><\/h2>\n<p>Fortunately, this myth has \u00a0been widely debunked. Sites like\u00a0<a href=\"https:\/\/www.twitteraudit.com\/\">Twitter Audit<\/a>\u00a0or\u00a0<a href=\"https:\/\/www.socialbakers.com\/twitter\/fakefollowercheck\/\">Social Bakers<\/a>\u00a0can be easily used to discover if a twitter user has fake followers or not. Such fake followers are largely bots or proxy accounts \u00a0run on behalf of real\/fake individuals.<\/p>\n<p>In fact, acquiring fake followers is not a difficult task and is actually a full-fledged online business. Take the case of\u00a0<a href=\"https:\/\/twitterwind.com\/\">twitterwind.com<\/a>, a site that offers different packages for the numbers of followers a customer would like to acquire, so forth and so on.<\/p>\n<p><a href=\"https:\/\/tropicaltalk.files.wordpress.com\/2013\/11\/screen-shot-2013-11-29-at-4-05-05-pm.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tropicaltalk.files.wordpress.com\/2013\/11\/screen-shot-2013-11-29-at-4-05-05-pm.png?w=300&amp;h=116\" alt=\"Twitterwind Packages\" width=\"300\" height=\"116\" \/><\/a><\/p>\n<p>There is\u00a0<a href=\"https:\/\/www.nytimes.com\/2012\/08\/23\/fashion\/twitter-followers-for-sale.html\">an excellent story on this<\/a>\u00a0by New York times\u00a0that describes\u00a0<em>buying and selling of fake twitter followers<\/em>\u00a0the worst kept secret in the Industry. Here is a\u00a0NBC news post\u00a0that questioned Mitt Romney\u2019s sudden jump in his twitter account following by a factor of 100,000 followers last year.\u00a0In may last year, NPR published a\u00a0<a href=\"https:\/\/www.npr.org\/blogs\/money\/2012\/05\/16\/152736671\/this-guy-will-sell-you-sell-you-1-000-facebook-likes\">news article\u00a0<\/a>\u00a0on how as low as $75 one could purchase 1000 Likes<\/p>\n<h2><strong>Myth \u2013 2 \u00a0Real people are running\u00a0any social media campaign, there is NO concept of fake (automated bots) followers.<\/strong><\/h2>\n<p>This is largely a defensive reaction of individuals who find themselves on the other side of the first myth. However, even this myth\/narrative is false.<\/p>\n<p>Automated bots or bot-nets have existed since the initial days of attacks on computers and networks by hackers and malware\/computer virus authors. Bots are compromised systems\/user accounts that could be used\u00a0for launching a malicious digital campaign\/attack on an unsuspecting user\/corporation or public at large.<\/p>\n<p>In the case of social media, there are\u00a0<em>three ways<\/em>\u00a0to create such bots.<\/p>\n<p><em>First<\/em>\u00a0way is to use an automated bot (compromised system) to do key-logging of individuals to find username\/password of an existing user.<\/p>\n<p><em>Second<\/em>\u00a0<em>way<\/em>\u00a0is to create fake accounts through auto programming. Two Italian researchers Italian security researchers Andrea Stroppa and Carlo De Micheli\u00a0reported on how such fake accounts could be created using software for sale. Washington post\u00a0carried this story. NewYorker magazine also has an\u00a0<a href=\"https:\/\/www.newyorker.com\/online\/blogs\/elements\/2013\/11\/the-rise-of-twitter-bots.html\">excellent article<\/a>\u00a0on such twitter bots.<\/p>\n<p><em>Third way<\/em>\u00a0is to launch a phishing attack on real users and harvest their Twitter\/Facebook accounts. Social media phishing is a new phenomenon. Some users would recall how<a href=\"https:\/\/www.huffingtonpost.com\/2013\/04\/23\/syrian-electronic-army-ap-twitter-hack_n_3140849.html\">\u00a0AP had tweeted\u00a0<\/a>about bombing in white house, once their account had been phished and hacked. Even the satire magazine Onion had suffered a\u00a0<a href=\"https:\/\/www.informationweek.com\/attacks\/how-syrian-electronic-army-unpeeled-the-onion\/d\/d-id\/1109872?\">similar phishing attack<\/a><\/p>\n<p>Twitter and Facebook both have taken a lot of steps to weed out such followers. Facebook\u00a0cracked down last year\u00a0on both fake followers and likes.<\/p>\n<div><img loading=\"lazy\" decoding=\"async\" title=\"Impact of some of the user's friends and followers after Facebook decided to crack down on fake followers \" src=\"https:\/\/blogs.independent.co.uk\/wp-content\/uploads\/2012\/09\/facebook-pages-top10-final.jpg\" alt=\"\" width=\"368\" height=\"277\" \/>Impact of some of the user\u2019s friends and followers after Facebook decided to crack down on fake followers<\/div>\n<h2><strong>Myth \u2013 3 There are no companies that actually can run such reputation enhancing\/smearing campaigns.\u00a0<\/strong><\/h2>\n<p>There is actually a proper world for this activity \u2013\u00a0Crowd-Turfing!<\/p>\n<p>\u201cCrowd-Turfing\u201d \u2013 term represents an activity of malicious crowd sourcing system that exist on social media and internet and display\u00a0following behaviors \u2013 crowd sourcing and astro-turfing.\u00a0<em>University of California \u2013 Santa Barbara<\/em>\u00a0came out with this term in their paper \u201c<a href=\"https:\/\/arxiv.org\/PS_cache\/arxiv\/pdf\/1111\/1111.5654v1.pdf\">Serf and Turf: Crowdtur\ufb01ng for Fun and Pro\ufb01t<\/a>\u201c<\/p>\n<p>In other words, not only it is possible to manipulate social media through automated and manual means, it is very much prevalent in many countries such as US and China. Crowd-turfing is neither novel or earth shattering, however it might be a complete novelty for some Indians. However, it is largely illegal but requires extensive skill set in establishing a trail of evidence to legally nail the culprit.<\/p>\n<p>This story is pretty old now from rest of the world perspective. UC Santa Barabara report on crowd-turfing mentioned such bots existing on very popular QQ services of Tencent and internet companies like Zubhajie again in China. This report documents purported activities of these\u00a0companies including account creation, forum post, QQ blog post etc.<\/p>\n<div>\n<p><a href=\"https:\/\/tropicaltalk.files.wordpress.com\/2013\/11\/screen-shot-2013-11-29-at-3-55-55-pm.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tropicaltalk.files.wordpress.com\/2013\/11\/screen-shot-2013-11-29-at-3-55-55-pm.png?w=300&amp;h=167\" alt=\"UC Santa Barbara report documents the kind of activities done by two of the crowd-turfing companies\" width=\"300\" height=\"167\" \/><\/a><\/p>\n<p>UC Santa Barbara report documents the kind of activities done by two of the crowd-turfing companies<\/p>\n<p><strong>There is an additional story here<\/strong>, there is an entire business category for\u00a0<strong>Online Reputation Management<\/strong>, that exists for improving online brands of individuals and companies.\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/cherylsnappconner\/2013\/04\/28\/reputation-management-when-your-business-is-disparaged-online\/\">Forbes has a good article on how online reputation management<\/a>\u00a0companies. They also posted a follow-up article on how some of these\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/cherylsnappconner\/2013\/05\/09\/the-dark-side-of-reputation-management-how-it-affects-your-business\/\">companies seemed to be doing dirty things under the hood<\/a>\u00a0\u2013 blackmailing as an example.<\/p>\n<p>Although, there are many more myths and narratives that could be challenged here, however if an informed spirit of enquiry could result from this, I would meet my objectives.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>An Indian investigative portal\u00a0Cobrapost, recently\u00a0released a report\u00a0on alleged online reputation smearing\/management\/campaigns designed to gain\/destroy political capital for who ever was&#8230;<\/p>\n","protected":false},"author":674,"featured_media":125939,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[3953,49,100,142,214,321],"coauthors":[3973],"class_list":["post-31689","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-antiphishing","tag-botnet","tag-facebook","tag-tag-identity-theft","tag-mobile-security1","tag-social-networking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing! | McAfee Blog<\/title>\n<meta name=\"description\" content=\"An Indian investigative portal\u00a0Cobrapost, recently\u00a0released a report\u00a0on alleged online reputation smearing\/management\/campaigns designed to gain\/destroy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing! | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"An Indian investigative portal\u00a0Cobrapost, recently\u00a0released a report\u00a0on alleged online reputation smearing\/management\/campaigns designed to gain\/destroy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-12-02T22:10:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T07:57:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tropicaltalk.files.wordpress.com\/2013\/11\/screen-shot-2013-11-29-at-4-05-05-pm.png?w=300&amp;h=116\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!\",\"datePublished\":\"2013-12-02T22:10:51+00:00\",\"dateModified\":\"2025-08-18T07:57:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/\"},\"wordCount\":865,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_SocialMedia.jpg\",\"keywords\":[\"antiphishing\",\"botnet\",\"facebook\",\"identity theft\",\"mobile security\",\"social networking\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/\",\"name\":\"Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing! | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_SocialMedia.jpg\",\"datePublished\":\"2013-12-02T22:10:51+00:00\",\"dateModified\":\"2025-08-18T07:57:18+00:00\",\"description\":\"An Indian investigative portal\u00a0Cobrapost, recently\u00a0released a report\u00a0on alleged online reputation smearing\/management\/campaigns designed to gain\/destroy\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_SocialMedia.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_SocialMedia.jpg\",\"width\":300,\"height\":200,\"caption\":\"social media access on phone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing! | McAfee Blog","description":"An Indian investigative portal\u00a0Cobrapost, recently\u00a0released a report\u00a0on alleged online reputation smearing\/management\/campaigns designed to gain\/destroy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing! | McAfee Blog","og_description":"An Indian investigative portal\u00a0Cobrapost, recently\u00a0released a report\u00a0on alleged online reputation smearing\/management\/campaigns designed to gain\/destroy","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2013-12-02T22:10:51+00:00","article_modified_time":"2025-08-18T07:57:18+00:00","og_image":[{"url":"https:\/\/tropicaltalk.files.wordpress.com\/2013\/11\/screen-shot-2013-11-29-at-4-05-05-pm.png?w=300&amp;h=116","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!","datePublished":"2013-12-02T22:10:51+00:00","dateModified":"2025-08-18T07:57:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/"},"wordCount":865,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_SocialMedia.jpg","keywords":["antiphishing","botnet","facebook","identity theft","mobile security","social networking"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/","name":"Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing! | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_SocialMedia.jpg","datePublished":"2013-12-02T22:10:51+00:00","dateModified":"2025-08-18T07:57:18+00:00","description":"An Indian investigative portal\u00a0Cobrapost, recently\u00a0released a report\u00a0on alleged online reputation smearing\/management\/campaigns designed to gain\/destroy","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_SocialMedia.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_SocialMedia.jpg","width":300,"height":200,"caption":"social media access on phone"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/social-media-manipulation-is-for-real-some-call-it-as-crowd-turfing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Social Media Manipulation Is For Real, Some Call It As Crowd-Turfing!"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/31689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=31689"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/31689\/revisions"}],"predecessor-version":[{"id":220084,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/31689\/revisions\/220084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/125939"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=31689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=31689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=31689"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=31689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}