Facebook Allows Calls for Violence Against Russian Leaders

The parent company of Facebook and Instagram, Meta  will now allow users in some countries to call for violence against Vladimir Putin and Russian soldiers over Ukraine’s invasion. 

The policy decision was immediately met with controversy and Russia’s embassy in the United States is demanding that Washington stop the “extremist activities” of the Facebook owner.

Meta says, “As a result of the Russian invasion of Ukraine, we have temporarily made allowances for forms of political expression that would normally violate our rules like violent speech such as ‘death to the Russian invaders,'” it in a statement. However, it says it won't permit calls for violence against Russian civilians.

The announcement came after Reuters news agency said it had seen internal emails outlining the policy shift. "In light of the ongoing invasion of Ukraine, we made a temporary exception for those affected by the war, to express violent sentiments towards invading armed forces," a Meta spokesperson told the BBC.

Under the amended policy, users in countries including Russia, Ukraine and Poland will also be able to call for the deaths of Russia's President Putin and Belarusian President Lukashenko. 

The internal emails reportedly said calls for the leaders' deaths will be allowed unless they contain other targets, or included a location or methods.Calls for violence against Russians are also allowed when the post is clearly references the invasion of Ukraine, the emails reportedly said. "We demand that US authorities stop the extremist activities of Meta, take measures to bring the perpetrators to justice," Russia's embassy in the US tweeted... Users of Facebook & Instagram did not give the owners of these platforms the right to determine the criteria of truth and pit nations against each other," it stated.

Russia announced recently that it was blocking Facebook and its platforms, citing 26 cases of "discrimination" against Russian media by Facebook since October 2020. While access to the site had already been restricted in Russia, it was not completely unavailable.

Reuters:     BBC:      Independent:      Al Jazeera:     Sky:    Business Insider:       CBS

You Might Also Read: 

Social Media Has Been Weaponised:

 

« Phishing Attack On US Government Linked To Chinese Hackers
Ukraine: Spam Website To Reach Millions Of Russians »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

Electric Power Research Institute (EPRI)

Electric Power Research Institute (EPRI)

The Electric Power Research Institute’s Cyber Security Research Laboratory (CSRL) addresses the security issues of critical functions of electric utilities.

Cylera

Cylera

Cylera is a Healthcare IoT cybersecurity and intelligence company built in close partnership with healthcare providers.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

CNF Technologies

CNF Technologies

CNF Technologies is an award-winning cyber company providing technology-focused research and development to commercial, federal, and Department of Defense clients.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.