Is Big Tech 'Fixing' The US Election?

There has been a growing concern about the influence of the major US 'Big Tech' companies, including the social media platforms operated by Facebook are Twitter, are having on various aspects of  US society, culture, business and government. However, the emerging problems with the 2020 Presidential election were not widely foreseen.

In essence, there are now questions over the role of the major social media platforms in deciding what the public should and should not know.

Last week The New York Post newspaper published an explosive news piece on the activities of Hunter Biden, son of the Democratic presidential nominee Joe Biden. The investigation, based on leaked emails, revealed the way in which the Democratic Presidential candidate's son may have used his father’s connections to pitch for lucrative contracts with Ukrainian businessmen. It is alleged that Hunter Biden introduced his father, then-Vice President Joe Biden, to a top executive at a Ukrainian energy firm less than a year before the elder Biden pressured the government officials in Ukraine into firing a prosecutor who was investigating the company, according to emails obtained by The Post.

Hunter Biden also pursued lucrative deals involving China’s largest private energy company, including one that he said would be “interesting for me and my family,” Since Joe Biden presents himself as the honest candidate in this US election, the fact that his family members may have been enriching themselves through their connections are relevant to the decisions the voters are about to make.

The source of the emails lies and their veracity are a subject of  dispute, however the New York Post is an established and reputable newspaper which will have applied its editorial criteria before deciding to publish the story

After the story was published in The New York Post both Twitter and Facebook made an unprecedented move into overt censorship, with the world’s largest social media companies, deciding to prevent the dissemination of the story. 

It is conceivable that Twitter might rightfully act if there were knowingly false information being disseminated ahead of an election by obscure or unknown actors seeking to affect an election. But it is quite another thing for the social media giant to decide that the re-posting of a story in the New York Post, one of America’s oldest and most venerable papers, founded by Alexander Hamilton, should be cause to suppress the speech of the White House Press Secretary. 

Some commentators are saying that this is not an attempt to prevent interference in an election, it is itself interference in an election.

Interference carried out by Facebook and Twitter, tech giants and monopolies in possession of unprecedented amounts of power. The idea that the Hunter Biden emails are the result of a hack is disputed. But even if the claim were accurate, it surely is not the case that these platforms usually take a strong line against stories based on hacked material. 

UnHerd:      New York Post:      CNBC:      Wall Street Journal:  

 

You Might Also Read:

Big Tech Benefits From COVID-19:

 

« AI Can Help Fight Coronavirus Cyber Crime
The Emerging Domain Of Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

SafeLogic

SafeLogic

SafeLogic provides strong encryption products for solutions in mobile, server, Cloud, appliance, wearable, and IoT environments that are pursuing compliance to strict regulatory requirements.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.