Top Social Media Websites Caught Censoring Controversial Content
MEDIA, SURVEILLANCE / SPYING / WHISTLEBLOWING / BIG BROTHER, 27 February 2012
Washington’s Blog – TRANSCEND Media Service
Censorship by Top Social Media Websites
Facebook pays low-wage foreign workers to delete certain content based upon a censorship list. For example, it deletes accounts created by Palestinian resistance groups.
Now, even social media site Reddit – which helped launch the anti-Sopa Internet blackout and publicize GoDaddy’s slimy Sopa support – is doing the same thing.
As just one example, posts from this website are being censored by Reddit. Specifically, a friend of this site who has submitted stories to Reddit has received the following messages of rejection from a Reddit moderator named davidreiss666:
from davidreiss666 via /r/worldnews/
WashingtonBlog is not something we consider a good source for r/Worldnews.
from davidreiss666 via /r/worldnews/
Please submit that story from an alternate domain. Thank you.
And another moderator named Maxion:
from Maxion via /r/worldnews/
I am sorry but this submission is not appropriate for this subreddit.
There are certainly also more open-minded moderators at Reddit. But a couple of censors can squash discussion on entire topics.
Why Are They Censoring?
Why are they censoring?
Well, censorship is rampant in America … and social media has grown so big that it has become a target as well.
In addition, as I pointed out last year [for ease of reading, we’ll skip indentation]:
Wired reported on Friday:
The Pentagon is looking to build a tool to sniff out social media propaganda campaigns and spit some counter-spin right back at it.
On Thursday, Defense Department extreme technology arm Darpa unveiled its Social Media in Strategic Communication (SMISC) program. It’s an attempt to get better at both detecting and conducting propaganda campaigns on social media. SMISC has two goals. First, the program needs to help the military better understand what’s going on in social media in real time — particularly in areas where troops are deployed. Second, Darpa wants SMISC to help the military play the social media propaganda game itself.
This is more than just checking the trending topics on Twitter. The Defense Department wants to deeply grok social media dynamics. So SMISC algorithms will be aimed at discovering and tracking the “formation, development and spread of ideas and concepts (memes)” on social media, according to Darpa’s announcement.
SMISC needs to be able to seek out “persuasion campaign structures and influence operations” developing across the social sphere. SMISC is supposed to quickly flag rumors and emerging themes on social media, figure out who’s behind it and what. Moreover, Darpa wants SMISC to be able to actually figure out whether this is a random product of the hivemind or a propaganda operation by an adversary nation or group.
Of course, SMISC won’t be content to just to hang back and monitor social media trends in strategic locations. It’s about building a better spin machine for Uncle Sam, too. Once SMISC’s latches on to an influence operation being launched, it’s supposed to help out in “countermessaging.”
SMISC is yet another example of how the military is becoming very interested in what’s going on in the social media sphere.
Indeed, as I wrote in February:
I noted in 2009, in an article entitled “Does The Government Manipulate Social Media?”:
The U.S. government long ago announced its intention to “fight the net”.
As revealed by an official Pentagon report signed by Rumsfeld called “Information Operations Roadmap”:
The roadmap [contains an] acknowledgement that information put out as part of the military’s psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans.
“Information intended for foreign audiences, including public diplomacy and Psyops, is increasingly consumed by our domestic audience,” it reads.
“Psyops messages will often be replayed by the news media for much larger audiences, including the American public,” it goes on.
“Strategy should be based on the premise that the Department [of Defense] will ‘fight the net’ as it would an enemy weapons system”.
Indeed, the Pentagon publicly announced years ago that it was considering using “black propaganda” – in other words, knowing lies.
CENTCOM announced in 2008 that a team of employees would be “[engaging] bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information.”
The Air Force is now also engaging bloggers. Indeed, an Air Force spokesman said:
“We obviously have many more concerns regarding cyberspace than a typical Social Media user,” Capt. Faggard says. “I am concerned with how insurgents or potential enemies can use Social Media to their advantage. It’s our role to provide a clear and accurate, completely truthful and transparent picture for any audience.”
In other words, the government is targeting “social media”, including popular user-ranked news sites.
In addition, when you look at what the Israeli lobby has done with Megaphone software to automatically vote stories questioning Israel down and to send pro-Israel letters to politicians and media (see this, this and this), you can start to see how the U.S. military – an even larger and better-funded organization – could substantially influence voting on social news sites with very little effort.
Moreover,the military has outsourced many projects to private contractors. For example, in Iraq, much of the fighting has been outsourced to Blackwater. And governmental intelligence functions have largely been outsourced to private companies.
It is therefore not impossible that the government is hiring cheap labor to downvote stories on the social media sites which question the government, and to post pro-government comments.
I pointed out the same month:
Government propagandists, their hired private contractors and useful idiots are creating “downvote bots” or scripts to bury stories which question the government.
One free, simple scripting program to create automatic downvotes of certain topics or news posters is called “Greasemonkey”, which is commonly used on large social news sites such as Reddit.
For example, there are some 2,480 hits … for the google search site:reddit.com greasemonkey downvote. This is some 2,480 times that Reddit users are publicly admitting to using greasemonkey (see also this).
Propaganda agents obviously aren’t going to publicly brag about what they are doing, and you can bet that their use of downvote bots is much greater. Moreover, they probably have more sophisticated software than Greasemonkey.
Today, Raw Story reports that the Air Force ordered software to manage army of fake virtual people:
Internet users would be well advised to ask another question entirely: Are my “friends” even real people?
In the continuing saga of data security firm HBGary, a new caveat has come to light: not only did they plot to help destroy secrets outlet WikiLeaks and discredit progressive bloggers, they also crafted detailed proposals for software that manages online “personas,” allowing a single human to assume the identities of as many fake people as they’d like.
The revelation was among those contained in the company’s emails, which were dumped onto bittorrent networks after hackers with cyber protest group “Anonymous” broke into their systems.
In another document unearthed by “Anonymous,” one of HBGary’s employees also mentioned gaming geolocation services to make it appear as though selected fake persons were at actual events.
“There are a variety of social media tricks we can use to add a level of realness to all fictitious personas,” it said.
Eerie as that may be, more perplexing, however, is a federal contract from the 6th Contracting Squadron at MacDill Air Force Base, located south of Tampa, Florida, that solicits providers of “persona management software.”
While there are certainly legitimate applications for such software, such as managing multiple “official” social media accounts from a single input, the more nefarious potential is clear.
Unfortunately, the Air Force’s contract description doesn’t help dispel their suspicions either. As the text explains, the software would require licenses for 50 users with 10 personas each, for a total of 500. These personas would have to be “replete with background , history, supporting details, and cyber presences that are technically, culturally and geographacilly consistent.”
It continues, noting the need for secure virtual private networks that randomize the operator’s Internet protocol (IP) address, making it impossible to detect that it’s a single person orchestrating all these posts. Another entry calls for static IP address management for each persona, making it appear as though each fake person was consistently accessing from the same computer each time.
The contract also sought methods to anonymously establish virtual private servers with private hosting firms in specific geographic locations. This would allow that server’s “geosite” to be integrated with their social media profiles, effectively gaming geolocation services.
The Air Force added that the “place of performance” for the contract would be at MacDill Air Force Base, along with Kabul, Afghanistan and Baghdad. The contract was offered on June 22, 2010.
It was not clear exactly what the Air Force was doing with this software, or even if it had been procured.
Though many questions remain about how the military would apply such technology, the reasonable fear should be perfectly clear. “Persona management software” can be used to manipulate public opinion on key information, such as news reports. An unlimited number of virtual “people” could be marshaled by only a few real individuals, empowering them to create the illusion of consensus.
That’s precisely what got DailyKos blogger Happy Rockefeller in a snit: the potential for military-run armies of fake people manipulating and, in some cases, even manufacturing the appearance of public opinion.
“I don’t know about you, but it matters to me what fellow progressives think,” the blogger wrote. “I consider all views. And if there appears to be a consensus that some reporter isn’t credible, for example, or some candidate for congress in another state can’t be trusted, I won’t base my entire judgment on it, but it carries some weight.
“That’s me. I believe there are many people though who will base their judgment on rumors and mob attacks. And for those people, a fake mob can be really effective.”
“Team Themis” [tasked by the Chamber of Commerce to come up with strategies for responding to progressive bloggers and others] also included a proposal to use malware hacks against progressive organizations, and the submission of fake documents in an effort to discredit established groups.
HBGary was also behind a plot by Bank of America to destroy WikiLeaks’ technology platform, other emails revealed. The company was humiliated by members of “Anonymous” after CEO Aaron Barr bragged that he’d “infiltrated” the group.
Postscript: Gaming social media is only one propaganda technique employed by the government:
- Famed Watergate reporter Carl Bernstein says the CIA has already bought and paid for many successful journalists
- The New York Times discusses in a matter-of-fact way the use of mainstream writers by the CIA to spread messages
- A 4-part BBC documentary called the “Century of the Self” shows that an American – Freud’s nephew, Edward Bernays – created the modern field of manipulation of public perceptions, and the U.S. government has extensively used his techniques
- The Independent discusses allegations of American propaganda
- And one of the premier writers on journalism says the U.S. has used widespread propaganda
DISCLAIMER: In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
Click here to go to the current weekly digest or pick another article:
- Washington Post Makes History: First Paper to Call for Prosecution of Its Own Source (After Accepting Pulitzer)
- Brazil’s Big Media Ignores Temer’s Confession — Except Estadão Columnist Who Falsely Claimed Video Was Altered
- North Dakota vs. Amy Goodman: Journalism Is Not a Crime
SURVEILLANCE / SPYING / WHISTLEBLOWING / BIG BROTHER: