Revealed: QAnon Facebook groups are growing at a rapid pace around the world | The Guardian

Guardian investigation finds the Facebook communities are gaining followers as Twitter cracks down on QAnon contentNew and established QAnon groups on Facebook are growing at a rapid pace and helping to spread the baseless and dangerous conspiracy theory to new countries around the world, a Guardian investigation has found.The Guardian has documented more than 170 QAnon groups, pages and accounts across Facebook and Instagram with more than 4.5m aggregate followers. The Guardian has also documented dedicated communities for QAnon followers in at least 15 countries on Facebook. Continue reading…

Guardian investigation finds the Facebook communities are gaining followers as Twitter cracks down on QAnon content

New and established QAnon groups on Facebook are growing at a rapid pace and helping to spread the baseless and dangerous conspiracy theory to new countries around the world, a Guardian investigation has found.

The Guardian has documented more than 170 QAnon groups, pages and accounts across Facebook and Instagram with more than 4.5m aggregate followers. The Guardian has also documented dedicated communities for QAnon followers in at least 15 countries on Facebook.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more