
Countering misinformation requires both laws and access to trusted news sources: Josephine Teo
Source: Straits Times
Article Date: 17 Jul 2025
Author: Goh Yan Han
Minister for Digital Development and Information Josephine Teo said Singapore must try to prevent 'cracks in our infrastructure of fact'.
Laws against fake news and manipulated content during elections will continue to be essential in safeguarding Singaporeans against information threats, but by themselves they are not enough to push back against misinformation, Minister for Digital Development and Information Josephine Teo said on July 16.
Instead, the Republic must try to prevent 'cracks in our infrastructure of fact', which pave the way for rogue actors to dominate its media and information landscape, as has happened elsewhere, said Mrs Teo.
That is why the Government has stepped in to support public service media, she added, which ensures that Singaporeans have continued access to trusted news sources, and to uphold the integrity of the city-state's infospace.
'Our long-term goal remains unchanged, and that is to nurture a resilient information ecosystem – one where truth can stand on its own, and public trust is anchored in an informed, engaged and discerning citizenry,' she said at the Singapore Press Club Awards 2025 held at Pan Pacific Singapore.
These efforts to counter misinformation are crucial because Singapore, as a diverse and open society, will always be susceptible to the dangers of misinformation, she said.
Mrs Teo cited examples from the 2020 General Election, when there were falsehoods on projected population figures and Covid-19 testing of foreign workers; and the 2023 Presidential Election, when there was a false claim that the Government could trace how individuals voted and penalise them for their choices.
Such attempts at misinformation could be addressed 'to some extent' with the Protection from Online Falsehoods and Manipulation Act (Pofma), which came into force in 2019.
This is as Pofma does not generally take a falsehood out of circulation but requires that a correction notice be carried alongside it, which means people can continue to believe the falsehood despite it being called out.
Lies also tend to travel faster than the truth, she added. 'We are realistic that a factual correction does not reach everyone who had seen the falsehood.'
The risks during the recent May 3 general election were much greater with the availability of artificial intelligence-generated deepfakes, she noted.
A compressed election timeline – there were nine days of campaigning during GE2025 – meant that the window to react was extremely narrow, said Mrs Teo.
'We therefore needed to be absolutely clear what was permitted and what was not, and who was accountable for validating the suspected content,' she added.
In October 2024, the authorities put in new safeguards when election laws were amended.
The Elections (Integrity of Online Advertising) (Amendment) Act, or Eliona, prohibits digitally generated or manipulated election-related content that realistically misrepresents a candidate's speech or actions during the election period.
Candidates have to declare whether content featuring them was true or false, and a wrongful declaration could have led to the result of their election being voided.
Thankfully, GE2025 did not see a surge in egregious misinformation or malicious synthetic content, said Mrs Teo. Neither Pofma nor Eliona was invoked during the recent election.
She added that Singapore is fortunate that its public service media remain trusted institutions, with the recent Reuters Digital News Report having found that 75 per cent of respondents trusted The Straits Times, while 74 per cent trusted CNA.
'These are outstanding achievements, especially when compared against the global average trust in media, which stands at just around 40 per cent,' she noted.
Going forward, Mrs Teo said public service media has to continue developing the right talent and instincts to provide quality journalistic content for Singaporeans.
'Content is still key. Information is the currency of the industry, and your insight is what sets you apart from the rest. This is also your mission and duty to your audiences,' she said to a room of over 240 guests, including journalists past and present.
Media outlets here must also keep pace with technology and the changing preferences of audiences by investing in new capabilities, adopting new processes and creating new products.
Mrs Teo cited SPH Media's in-house multimedia facility Studio+65, which allows for virtual production, audiovisual storytelling and digital content creation.
Mediacorp has also deployed AI in its newsrooms, automating translation and subtitling processes, she noted.
In her speech, Mrs Teo spotlighted some award winners for innovating and finding new ways of bringing important stories to readers.
They included ST senior correspondent Stephanie Yeo, who won a health journalism award for her well-researched reports on women's health issues that raised awareness of conditions such as endometriosis and menopause and their available treatment options.
Endometriosis is a condition whereby tissue similar to the womb lining grows outside of the womb.
Mrs Teo said public service media in Singapore has defied the odds and avoided the fates of many of its international counterparts, and that generations of journalists played an important role in fostering a thriving and vibrant media ecosystem here.
'It is fair to say that journalism has never been an easy job, and it has become only harder in recent decades. But you have soldiered on with a tireless commitment to excellence,' she said.
'Your dedication to the craft has been instrumental in upholding truth and trust in Singapore's information space, shaping an informed audience and a stronger Singapore.'
Source: The Straits Times © SPH Media Limited. Permission required for reproduction.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


AsiaOne
6 hours ago
- AsiaOne
Critical infrastructure in Singapore under attack by cyber espionage group: Shanmugam, Singapore News
SINGAPORE - The authorities are dealing with an ongoing attack on Singapore's critical information infrastructure by a state-sponsored cyber espionage group, UNC3886. Naming the nation's attacker for the first time on Friday (July 18), Coordinating Minister for National Security K. Shanmugam said that Singapore is facing serious threats from state-linked advanced persistent threat (APT) actors. These are well-resourced attackers that use sophisticated techniques to evade detection. They lurk in networks to spy over the long term, to steal sensitive information or disrupt essential services, among other objectives. "UNC3886 poses a serious threat to us, and has the potential to undermine our national security," said Mr Shanmugam at the Cyber Security Agency of Singapore's (CSA) 10th anniversary dinner at Sands Expo and Convention Centre. "Even as we speak, UNC3886 is attacking our critical infrastructure right now." Mr Shanmugam, who is also Home Affairs Minister, did not disclose UNC3886's sponsors, but experts have said that the group is linked to China. Cyber-security firm Mandiant first detected the Chinese espionage group in 2022. UNC3886 is said to have targeted prominent strategic organisations - including those in the defence, technology and telecommunication sectors - on a global scale. APT hackers like UNC3886 gain unauthorised access into networks by employing techniques such as custom malware and tools available on the victim's system to evade detection. Zero-day exploits, which are unpatched vulnerabilities, are also typically used to gain entry to networks. Mr Shanmugam said CSA and relevant agencies are actively dealing with the attack, and are working with relevant critical information infrastructure owners. Describing UNC3886 as highly sophisticated and persistent in victim networks, he said: "The intent of this threat actor in attacking Singapore is quite clear. They are going after high-value, strategic targets - vital infrastructure that delivers our essential services. "If it succeeds, it can conduct espionage, and it can cause major disruption to Singapore and Singaporeans." Mr Shanmugam said the number of suspected APT attacks in Singapore has increased more than fourfold from 2021 to 2024. Illustrating how APTs seriously threaten national security, Mr Shanmugam said a cyber attack on Singapore's power system could disrupt its electricity supply, which could have a knock-on effect on other essential services such as healthcare or transport. "There are also economic implications. Our banks, airport and industries would not be able to operate. Our economy can be substantially affected," he said. Attacks on Singapore's telco systems and payment systems can have very serious consequences too, he added. He said attacks on the nation's systems and infrastructure will impact how it does business, with Singapore having to relook its vendors and supply chains. Trust and confidence in Singapore as a whole can also be affected, he added. "Businesses may shy away if they are unsure about our systems - whether the systems are clean, resilient, safe," he said. Mr Shanmugam cited APT attacks in Ukraine that caused a power outage. He also cited a cyber attack on a South Korean telecommunications company in April 2025 that exposed the SIM data of nearly 27 million users and caused widespread concern in the country. "Singapore has been attacked as well. We are a relevant country geopolitically. We are a digital and data hub that connects the world," he said. "People want to get into our systems, to both influence us and threaten us." He highlighted some attacks from APT actors in Singapore that have been made public, but where the culprits were not named due to national security reasons. These include an incident in 2014 when the authorities detected a security breach in the Ministry of Foreign Affairs' technology systems. Steps were taken to isolate the affected devices, and the networks were strengthened following the discovery. In what was the first sophisticated attack against universities here, NUS and NTU discovered intrusions in their networks in 2017. No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The universities were involved in government-linked projects for the defence, foreign affairs and transport sectors. Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong. The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures, and illegally access and exfiltrate data. The attacker is believed to have lurked in the healthcare group's network for at least nine months. Its mission: to access SingHealth's electronic medical records system, which is critical information infrastructure in Singapore. The unauthorised transfer of sensitive data took place in 2018. Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet. APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack. Mr Shanmugam said Singapore has been and continues to be attacked by cyber threat actors. He cited a survey which showed that nearly 80 per cent of organisations in Singapore have experienced some form of cyber attack. At the event on July 18, CSA chief executive David Koh noted that cyberspace is contested, and that the agency is on the front line of this dynamic domain. "We will continue to be agile, to adapt to emerging threats, and to demonstrate our collective will and commitment to secure Singapore's cyberspace," he added. This article was first published in The Straits Times . Permission required for reproduction.


AsiaOne
6 hours ago
- AsiaOne
Critical infrastructure in Singapore under attack by cyber espionage group: Shanmugam
SINGAPORE - The authorities are dealing with an ongoing attack on Singapore's critical information infrastructure by a state-sponsored cyber espionage group, UNC3886. Naming the nation's attacker for the first time on Friday (July 18), Coordinating Minister for National Security K. Shanmugam said that Singapore is facing serious threats from state-linked advanced persistent threat (APT) actors. These are well-resourced attackers that use sophisticated techniques to evade detection. They lurk in networks to spy over the long term, to steal sensitive information or disrupt essential services, among other objectives. "UNC3886 poses a serious threat to us, and has the potential to undermine our national security," said Mr Shanmugam at the Cyber Security Agency of Singapore's (CSA) 10th anniversary dinner at Sands Expo and Convention Centre. "Even as we speak, UNC3886 is attacking our critical infrastructure right now." Mr Shanmugam, who is also Home Affairs Minister, did not disclose UNC3886's sponsors, but experts have said that the group is linked to China. Cyber-security firm Mandiant first detected the Chinese espionage group in 2022. UNC3886 is said to have targeted prominent strategic organisations - including those in the defence, technology and telecommunication sectors - on a global scale. APT hackers like UNC3886 gain unauthorised access into networks by employing techniques such as custom malware and tools available on the victim's system to evade detection. Zero-day exploits, which are unpatched vulnerabilities, are also typically used to gain entry to networks. Mr Shanmugam said CSA and relevant agencies are actively dealing with the attack, and are working with relevant critical information infrastructure owners. Describing UNC3886 as highly sophisticated and persistent in victim networks, he said: "The intent of this threat actor in attacking Singapore is quite clear. They are going after high-value, strategic targets - vital infrastructure that delivers our essential services. "If it succeeds, it can conduct espionage, and it can cause major disruption to Singapore and Singaporeans." Mr Shanmugam said the number of suspected APT attacks in Singapore has increased more than fourfold from 2021 to 2024. Illustrating how APTs seriously threaten national security, Mr Shanmugam said a cyber attack on Singapore's power system could disrupt its electricity supply, which could have a knock-on effect on other essential services such as healthcare or transport. "There are also economic implications. Our banks, airport and industries would not be able to operate. Our economy can be substantially affected," he said. Attacks on Singapore's telco systems and payment systems can have very serious consequences too, he added. He said attacks on the nation's systems and infrastructure will impact how it does business, with Singapore having to relook its vendors and supply chains. Trust and confidence in Singapore as a whole can also be affected, he added. "Businesses may shy away if they are unsure about our systems - whether the systems are clean, resilient, safe," he said. Mr Shanmugam cited APT attacks in Ukraine that caused a power outage. He also cited a cyber attack on a South Korean telecommunications company in April 2025 that exposed the SIM data of nearly 27 million users and caused widespread concern in the country. "Singapore has been attacked as well. We are a relevant country geopolitically. We are a digital and data hub that connects the world," he said. "People want to get into our systems, to both influence us and threaten us." He highlighted some attacks from APT actors in Singapore that have been made public, but where the culprits were not named due to national security reasons. These include an incident in 2014 when the authorities detected a security breach in the Ministry of Foreign Affairs' technology systems. Steps were taken to isolate the affected devices, and the networks were strengthened following the discovery. In what was the first sophisticated attack against universities here, NUS and NTU discovered intrusions in their networks in 2017. No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The universities were involved in government-linked projects for the defence, foreign affairs and transport sectors. Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong. The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures, and illegally access and exfiltrate data. The attacker is believed to have lurked in the healthcare group's network for at least nine months. Its mission: to access SingHealth's electronic medical records system, which is critical information infrastructure in Singapore. The unauthorised transfer of sensitive data took place in 2018. Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet. APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack. Mr Shanmugam said Singapore has been and continues to be attacked by cyber threat actors. He cited a survey which showed that nearly 80 per cent of organisations in Singapore have experienced some form of cyber attack. At the event on July 18, CSA chief executive David Koh noted that cyberspace is contested, and that the agency is on the front line of this dynamic domain. "We will continue to be agile, to adapt to emerging threats, and to demonstrate our collective will and commitment to secure Singapore's cyberspace," he added. This article was first published in The Straits Times. Permission required for reproduction.

Straits Times
7 hours ago
- Straits Times
Mindef, SAF units among those dealing with attack on S'pore's critical information infrastructure
Defence Minister Chan Chun Sing (in black shirt) observing a weapon refresher for servicemen during a mobilisation exercise at Selarang Camp on July 19. SINGAPORE - Select units from the Ministry of Defence (Mindef) and the Singapore Armed Forces (SAF) are part of a whole-of-government effort to deal with an ongoing cyberattack on Singapore's critical information infrastructure , said Defence Minister Chan Chun Sing on July 19. Mr Chan, who was visiting Selarang Camp in Loyang to observe a mobilisation exercise involving more than 2,000 reservist soldiers, noted that the cyberattack is an example of the emerging threats that the military has to handle. While he did not give specifics about which units are involved, the Digital and Intelligence Service established in October 2022 is the SAF service responsible for securing Singapore's cyber domain. In particular, the Defence Cyber Command , which was launched in March, is the unit tasked with defending Mindef and SAF against cyber threats. Separately, Coordinating Minister for National Security K. Shanmugam said on July 19 that the Government decided to name the state-sponsored espionage group behind the ongoing cyberattack because 'Singaporeans ought to know where (it) was from'. Mr Shanmugam, however, would not to be drawn into a discussion about links between the group known as UNC3886 and China . 'As far as the Singapore Government is concerned, we can say we are confident that it is this particular organisation. Who they are linked to, and how they operate, is not something I want to go into,' he said on the sidelines of a community event in Chong Pang, where he is MP. Top stories Swipe. Select. Stay informed. Singapore Bukit Panjang LRT disruption: Train service resumes after power fault affects 13-station line Asia Autogate glitch causes chaos at KLIA and Johor checkpoints, foreign passport holders affected Singapore A deadly cocktail: Easy access, lax attitudes driving Kpod scourge in S'pore Singapore 'I thought it was an April Fool's joke': Teen addicted to Kpods on news that friend died Singapore Who decides when you can't? A guide on planning for end-of-life care Singapore S'pore sees no baby boom in Year of the Dragon despite slight rise in births in 2024 Singapore New auto pet wash service in Buona Vista draws flak, but company stands by its safety Mr Shanmugan said the number of cyber incidents that are disclosed to the public are far smaller than the actual number of attacks, and the lack of disclosure is because of national security or public interest reasons. He added: 'This time round, our assessment was that we can disclose these details... We have confidence as to who the attacker was. So we thought that that is appropriate to disclose.' The ongoing attack on Singapore's critical infrastructure was made public by Mr Shanmugam during the Cyber Security Agency of Singapore's (CSA) 10th anniversary dinner on July 18. Describing UNC3886 as highly sophisticated and persistent, Mr Shanmugam said the group is going after high-value, strategic targets that deliver essential services to the country. 'If it succeeds, it can conduct espionage, and it can cause major disruption to Singapore and Singaporeans,' Mr Shanmugam added, noting that the number of suspected attacks here by similarly sophisticated threat actors has increased more than fourfold from 2021 to 2024. In social media posts on July 19, Minister for Digital Development and Information Josephine Teo made a similar point as to why the Government has decided to disclose the attack by UNC3886. 'Singaporeans should be aware about the ongoing threats we face in cyberspace, and there is never a perfect time to disclose such incidents,' Mrs Teo wrote. 'We always have to strike a fine balance between maintaining operational security and raising public awareness, especially while live operations are ongoing.' Mrs Teo said the CSA works tirelessly with partner agencies to shore up Singapore's cyber defences, but it cannot do so alone. 'The support of fellow Singaporeans — in knowing the dangers that confront us, and staying united, vigilant and resolute in the face of threats — will be key to securing a safe and resilient digital future,' she added. During his visit to Selarang Camp on July 19, Mr Chan was shown how a Smart Mobilisation system built into the OneNS mobile application has helped to speed things up for operationally ready national servicemen (NSmen). Mr Chan said: 'In the past, a typical NSman will require perhaps three to four hours from start to end. Today, I think if they are really fast, they can do it within one to two hours.' The Smart Mobilisation system was introduced in March 2024 for selected SAF units, and it will be extended to all units by the end of 2025. 'Of course, the SAF is never complacent. We will continuously refine our processes to see how we can make it more seamless,' the minister added. Mr Chan noted how past mobilisation exercises relied on manual processes, which meant NSmen had to queue up and wait their turn to get their equipment and readiness checked. With the new system, attendance can be clocked digitally, and NSmen can perform their checks in a more decentralised manner. Servicemen from the 9th Singapore Division having their attendance taken at each station via QR code during a mobilisation exercise at Selarang Camp on July 19. ST PHOTO: KEVIN LIM The system also gives commanders, like Captain (NS) Jeremy Ang, 46, real-time information about the status of the mobilisation exercise. 'It's made things a lot smoother... And for the men on the ground, it is faster in, faster out,' said the school principal, who serves as deputy operations officer at the 23rd Singapore Infantry Brigade. Captain (NS) Jeremy Ang said the system gives commanders real-time information about the status of the mobilisation exercise. ST PHOTO: KEVIN LIM Mr Chan, who was appointed Defence Minister on May 23, said the most critical component of Singapore's defence is the fighting spirit of its men, and the SAF is looking at ways to continue to strengthen this spirit and the operational readiness of its troops. Pointing to new operational challenges on the horizon, Mr Chan said Mindef and the SAF are constantly looking at the lessons that can be learnt, including from conflicts in Europe and Middle East. 'Even before the threat emerges, we must be able to get our plans ready,' Mr Chan said. 'We don't necessarily have to show everyone what we have and what we do, but we must be quietly confident that we are able to handle the range of threats,' he added.