Is Big Tech 'Fixing' The US Election?

There has been a growing concern about the influence of the major US 'Big Tech' companies, including the social media platforms operated by Facebook are Twitter, are having on various aspects of  US society, culture, business and government. However, the emerging problems with the 2020 Presidential election were not widely foreseen.

In essence, there are now questions over the role of the major social media platforms in deciding what the public should and should not know.

Last week The New York Post newspaper published an explosive news piece on the activities of Hunter Biden, son of the Democratic presidential nominee Joe Biden. The investigation, based on leaked emails, revealed the way in which the Democratic Presidential candidate's son may have used his father’s connections to pitch for lucrative contracts with Ukrainian businessmen. It is alleged that Hunter Biden introduced his father, then-Vice President Joe Biden, to a top executive at a Ukrainian energy firm less than a year before the elder Biden pressured the government officials in Ukraine into firing a prosecutor who was investigating the company, according to emails obtained by The Post.

Hunter Biden also pursued lucrative deals involving China’s largest private energy company, including one that he said would be “interesting for me and my family,” Since Joe Biden presents himself as the honest candidate in this US election, the fact that his family members may have been enriching themselves through their connections are relevant to the decisions the voters are about to make.

The source of the emails lies and their veracity are a subject of  dispute, however the New York Post is an established and reputable newspaper which will have applied its editorial criteria before deciding to publish the story

After the story was published in The New York Post both Twitter and Facebook made an unprecedented move into overt censorship, with the world’s largest social media companies, deciding to prevent the dissemination of the story. 

It is conceivable that Twitter might rightfully act if there were knowingly false information being disseminated ahead of an election by obscure or unknown actors seeking to affect an election. But it is quite another thing for the social media giant to decide that the re-posting of a story in the New York Post, one of America’s oldest and most venerable papers, founded by Alexander Hamilton, should be cause to suppress the speech of the White House Press Secretary. 

Some commentators are saying that this is not an attempt to prevent interference in an election, it is itself interference in an election.

Interference carried out by Facebook and Twitter, tech giants and monopolies in possession of unprecedented amounts of power. The idea that the Hunter Biden emails are the result of a hack is disputed. But even if the claim were accurate, it surely is not the case that these platforms usually take a strong line against stories based on hacked material. 

UnHerd:      New York Post:      CNBC:      Wall Street Journal:  

 

You Might Also Read:

Big Tech Benefits From COVID-19:

 

« AI Can Help Fight Coronavirus Cyber Crime
The Emerging Domain Of Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Digital DNA

Digital DNA

Digital DNA provides Law-Enforcement-Grade Computer Forensics, Cyber Security and E-Discovery Investigations.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

DNX Ventures

DNX Ventures

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

ITConnexion

ITConnexion

From cloud migration to ransomware protection, our managed IT services can be customised to address the most prevalent IT issues for your business.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.