Is Big Tech 'Fixing' The US Election?

There has been a growing concern about the influence of the major US 'Big Tech' companies, including the social media platforms operated by Facebook are Twitter, are having on various aspects of  US society, culture, business and government. However, the emerging problems with the 2020 Presidential election were not widely foreseen.

In essence, there are now questions over the role of the major social media platforms in deciding what the public should and should not know.

Last week The New York Post newspaper published an explosive news piece on the activities of Hunter Biden, son of the Democratic presidential nominee Joe Biden. The investigation, based on leaked emails, revealed the way in which the Democratic Presidential candidate's son may have used his father’s connections to pitch for lucrative contracts with Ukrainian businessmen. It is alleged that Hunter Biden introduced his father, then-Vice President Joe Biden, to a top executive at a Ukrainian energy firm less than a year before the elder Biden pressured the government officials in Ukraine into firing a prosecutor who was investigating the company, according to emails obtained by The Post.

Hunter Biden also pursued lucrative deals involving China’s largest private energy company, including one that he said would be “interesting for me and my family,” Since Joe Biden presents himself as the honest candidate in this US election, the fact that his family members may have been enriching themselves through their connections are relevant to the decisions the voters are about to make.

The source of the emails lies and their veracity are a subject of  dispute, however the New York Post is an established and reputable newspaper which will have applied its editorial criteria before deciding to publish the story

After the story was published in The New York Post both Twitter and Facebook made an unprecedented move into overt censorship, with the world’s largest social media companies, deciding to prevent the dissemination of the story. 

It is conceivable that Twitter might rightfully act if there were knowingly false information being disseminated ahead of an election by obscure or unknown actors seeking to affect an election. But it is quite another thing for the social media giant to decide that the re-posting of a story in the New York Post, one of America’s oldest and most venerable papers, founded by Alexander Hamilton, should be cause to suppress the speech of the White House Press Secretary. 

Some commentators are saying that this is not an attempt to prevent interference in an election, it is itself interference in an election.

Interference carried out by Facebook and Twitter, tech giants and monopolies in possession of unprecedented amounts of power. The idea that the Hunter Biden emails are the result of a hack is disputed. But even if the claim were accurate, it surely is not the case that these platforms usually take a strong line against stories based on hacked material. 

UnHerd:      New York Post:      CNBC:      Wall Street Journal:  

 

You Might Also Read:

Big Tech Benefits From COVID-19:

 

« AI Can Help Fight Coronavirus Cyber Crime
The Emerging Domain Of Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

National Cybersecurity Competence Centre (NC3) - Czech Republic

National Cybersecurity Competence Centre (NC3) - Czech Republic

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

Flexxon

Flexxon

Flexxon is the industry leader to develop NAND flash storage devices. Our key focus is to innovate memory devices ensuring data security and reliability.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

V3 Cybersecurity

V3 Cybersecurity

V3 Cybersecurity is a unique company focused on contextualization of security programs from a business perspective. Our mission is to provide enterprise IT Risk Management capabilities.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

Smartcomply

Smartcomply

Smartcomply is an automated and AI-powered cybersecurity and compliance platform that aids businesses in reducing the time and money spent on cybersecurity and compliance.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.