Is Big Tech 'Fixing' The US Election?

There has been a growing concern about the influence of the major US 'Big Tech' companies, including the social media platforms operated by Facebook are Twitter, are having on various aspects of  US society, culture, business and government. However, the emerging problems with the 2020 Presidential election were not widely foreseen.

In essence, there are now questions over the role of the major social media platforms in deciding what the public should and should not know.

Last week The New York Post newspaper published an explosive news piece on the activities of Hunter Biden, son of the Democratic presidential nominee Joe Biden. The investigation, based on leaked emails, revealed the way in which the Democratic Presidential candidate's son may have used his father’s connections to pitch for lucrative contracts with Ukrainian businessmen. It is alleged that Hunter Biden introduced his father, then-Vice President Joe Biden, to a top executive at a Ukrainian energy firm less than a year before the elder Biden pressured the government officials in Ukraine into firing a prosecutor who was investigating the company, according to emails obtained by The Post.

Hunter Biden also pursued lucrative deals involving China’s largest private energy company, including one that he said would be “interesting for me and my family,” Since Joe Biden presents himself as the honest candidate in this US election, the fact that his family members may have been enriching themselves through their connections are relevant to the decisions the voters are about to make.

The source of the emails lies and their veracity are a subject of  dispute, however the New York Post is an established and reputable newspaper which will have applied its editorial criteria before deciding to publish the story

After the story was published in The New York Post both Twitter and Facebook made an unprecedented move into overt censorship, with the world’s largest social media companies, deciding to prevent the dissemination of the story. 

It is conceivable that Twitter might rightfully act if there were knowingly false information being disseminated ahead of an election by obscure or unknown actors seeking to affect an election. But it is quite another thing for the social media giant to decide that the re-posting of a story in the New York Post, one of America’s oldest and most venerable papers, founded by Alexander Hamilton, should be cause to suppress the speech of the White House Press Secretary. 

Some commentators are saying that this is not an attempt to prevent interference in an election, it is itself interference in an election.

Interference carried out by Facebook and Twitter, tech giants and monopolies in possession of unprecedented amounts of power. The idea that the Hunter Biden emails are the result of a hack is disputed. But even if the claim were accurate, it surely is not the case that these platforms usually take a strong line against stories based on hacked material. 

UnHerd:      New York Post:      CNBC:      Wall Street Journal:  

 

You Might Also Read:

Big Tech Benefits From COVID-19:

 

« AI Can Help Fight Coronavirus Cyber Crime
The Emerging Domain Of Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Ankura Consulting Group

Ankura Consulting Group

Ankura is a global expert services and advisory firm that delivers services and end-to-end solutions in a wide range of areas including cybersecurity and digital transformation.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.

Intelligent Technical Solutions (ITS)

Intelligent Technical Solutions (ITS)

We help businesses manage their technology. Intelligent Technical Solutions provide you with the right technical solution, so you can get back to running your business.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

SentryMark

SentryMark

Stay a Step Ahead of Emerging Threats. Deviate from the traditional siloed defenses and get the proactive and responsive cybersecurity solutions and services you deserve with SentryMark today.

CyberMass

CyberMass

CyberMass provides Cyber Advisory/Consulting, Professional and Managed Services offering complete cybersecurity as a service protection to businesses.