Is Big Tech 'Fixing' The US Election?

There has been a growing concern about the influence of the major US 'Big Tech' companies, including the social media platforms operated by Facebook are Twitter, are having on various aspects of  US society, culture, business and government. However, the emerging problems with the 2020 Presidential election were not widely foreseen.

In essence, there are now questions over the role of the major social media platforms in deciding what the public should and should not know.

Last week The New York Post newspaper published an explosive news piece on the activities of Hunter Biden, son of the Democratic presidential nominee Joe Biden. The investigation, based on leaked emails, revealed the way in which the Democratic Presidential candidate's son may have used his father’s connections to pitch for lucrative contracts with Ukrainian businessmen. It is alleged that Hunter Biden introduced his father, then-Vice President Joe Biden, to a top executive at a Ukrainian energy firm less than a year before the elder Biden pressured the government officials in Ukraine into firing a prosecutor who was investigating the company, according to emails obtained by The Post.

Hunter Biden also pursued lucrative deals involving China’s largest private energy company, including one that he said would be “interesting for me and my family,” Since Joe Biden presents himself as the honest candidate in this US election, the fact that his family members may have been enriching themselves through their connections are relevant to the decisions the voters are about to make.

The source of the emails lies and their veracity are a subject of  dispute, however the New York Post is an established and reputable newspaper which will have applied its editorial criteria before deciding to publish the story

After the story was published in The New York Post both Twitter and Facebook made an unprecedented move into overt censorship, with the world’s largest social media companies, deciding to prevent the dissemination of the story. 

It is conceivable that Twitter might rightfully act if there were knowingly false information being disseminated ahead of an election by obscure or unknown actors seeking to affect an election. But it is quite another thing for the social media giant to decide that the re-posting of a story in the New York Post, one of America’s oldest and most venerable papers, founded by Alexander Hamilton, should be cause to suppress the speech of the White House Press Secretary. 

Some commentators are saying that this is not an attempt to prevent interference in an election, it is itself interference in an election.

Interference carried out by Facebook and Twitter, tech giants and monopolies in possession of unprecedented amounts of power. The idea that the Hunter Biden emails are the result of a hack is disputed. But even if the claim were accurate, it surely is not the case that these platforms usually take a strong line against stories based on hacked material. 

UnHerd:      New York Post:      CNBC:      Wall Street Journal:  

 

You Might Also Read:

Big Tech Benefits From COVID-19:

 

« AI Can Help Fight Coronavirus Cyber Crime
The Emerging Domain Of Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TUV Sud

TUV Sud

TÜV SÜD is a leading technical service organisation. We specialize in testing, certification, auditing, training, and advisory services for different industries.

7Safe

7Safe

7Safe has been delivering hands-on digital security training courses since 2001 and offer e a portfolio of university and industry-accredited courses.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Greensafe IT

Greensafe IT

Greensafe offer various onsite and offsite data erasure services, aimed at increasing data security whilst reducing any risk of data loss during transit.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

Acmetek Global Solutions

Acmetek Global Solutions

Acmetek is a Global Distributor and a Trusted Advisor of PKI /IOT & SSL Security Products and a Managed Services Company.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

Options Technology

Options Technology

Options is a global leader in financial technology, specialising in Capital Markets technology and enterprise-grade solutions.

Cakewalk

Cakewalk

Cakewalk is the new standard in easy Access Control. Trusted by IT & Security teams. Loved by employees.