МИД и Минюст предложили исключить «Талибан» из списка террористических организаций
Напомним, журналистка Надежда Кеворкова была отправлена в СИЗО, в частности, за пост, якобы «оправдывающий» это движение.
Представители «Талибана» регулярно приезжают в Россию с дипломатическим визитами. В частности, в мае они участвовали в форуме в Татарстане «Россия — исламский мир: KazanForum 2024».
МИД и Минюст предложили исключить «Талибан» из списка террористических организаций
Напомним, журналистка Надежда Кеворкова была отправлена в СИЗО, в частности, за пост, якобы «оправдывающий» это движение.
Представители «Талибана» регулярно приезжают в Россию с дипломатическим визитами. В частности, в мае они участвовали в форуме в Татарстане «Россия — исламский мир: KazanForum 2024».
Official government accounts have also spread fake fact checks. An official Twitter account for the Russia diplomatic mission in Geneva shared a fake debunking video claiming without evidence that "Western and Ukrainian media are creating thousands of fake news on Russia every day." The video, which has amassed almost 30,000 views, offered a "how-to" spot misinformation. As a result, the pandemic saw many newcomers to Telegram, including prominent anti-vaccine activists who used the app's hands-off approach to share false information on shots, a study from the Institute for Strategic Dialogue shows. At its heart, Telegram is little more than a messaging app like WhatsApp or Signal. But it also offers open channels that enable a single user, or a group of users, to communicate with large numbers in a method similar to a Twitter account. This has proven to be both a blessing and a curse for Telegram and its users, since these channels can be used for both good and ill. Right now, as Wired reports, the app is a key way for Ukrainians to receive updates from the government during the invasion. But because group chats and the channel features are not end-to-end encrypted, Galperin said user privacy is potentially under threat. The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes.
from no