{"id":17622,"date":"2012-02-27T12:00:03","date_gmt":"2012-02-27T12:00:03","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=17622"},"modified":"2015-03-09T16:44:49","modified_gmt":"2015-03-09T16:44:49","slug":"top-social-media-websites-caught-censoring-controversial-content","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2012\/02\/top-social-media-websites-caught-censoring-controversial-content\/","title":{"rendered":"Top Social Media Websites Caught Censoring Controversial Content"},"content":{"rendered":"<p><strong>Censorship by Top Social Media Websites<\/strong><\/p>\n<p>Facebook <a href=\"http:\/\/www.rawstory.com\/rs\/2012\/02\/22\/low-wage-facebook-contractor-leaks-secret-censorship-list\/\" title=\"pays low-wage foreign workers to delete certain content based upon a censorship list\"  target=\"_blank\">pays low-wage foreign workers to delete certain content based upon a censorship list<\/a>. For example, it deletes accounts created by Palestinian resistance groups.<\/p>\n<p>Digg was caught censoring stories which were controversial or too critical of the government. See <a href=\"http:\/\/www.wired.com\/techbiz\/people\/news\/2007\/03\/72835\" title=\"this\"  target=\"_blank\">this<\/a> and <a href=\"http:\/\/web.archive.org\/web\/20070311084954\/http:\/www.informationliberation.com\/?id=20587\" title=\"this\"  target=\"_blank\">this<\/a>.<\/p>\n<p>Now, even social media site Reddit \u2013 which helped launch the anti-Sopa Internet blackout and publicize GoDaddy\u2019s slimy Sopa support \u2013 is doing the same thing.<\/p>\n<p>As just one example, posts from this website are being censored by Reddit. Specifically, a friend of this site who has submitted stories to Reddit has received the following messages of rejection from a Reddit moderator named davidreiss666:<\/p>\n<p>from <strong><a href=\"http:\/\/www.reddit.com\/user\/davidreiss666\" title=\"davidreiss666\"  target=\"_blank\">davidreiss666<\/a> via \/r\/worldnews\/<\/strong><\/p>\n<p>WashingtonBlog is not something we consider a good source for r\/Worldnews.<\/p>\n<p>from <strong><a href=\"http:\/\/www.reddit.com\/user\/davidreiss666\" title=\"davidreiss666\"  target=\"_blank\">davidreiss666<\/a> via \/r\/worldnews\/<\/strong><\/p>\n<p>Please submit that story from an alternate domain. Thank you.<\/p>\n<p>And another moderator named Maxion:<\/p>\n<p>from <strong><a href=\"http:\/\/www.reddit.com\/user\/Maxion\" title=\"Maxion\"  target=\"_blank\">Maxion<\/a> via \/r\/worldnews\/<\/strong><\/p>\n<p>I am sorry but this submission is not appropriate for this subreddit.<\/p>\n<p>There are certainly also more open-minded moderators at Reddit. But a couple of censors can squash discussion on entire topics.<\/p>\n<p><strong>Why Are They Censoring?<\/strong><\/p>\n<p>Why are they censoring?<\/p>\n<p>Well, <a target=\"_blank\" href=\"http:\/\/www.washingtonsblog.com\/2011\/07\/mainstream-media-presstitutes-for-the-rich-and-powerful.html\" title=\"censorship is rampant\" >censorship is rampant<\/a> in America \u2026 and social media has grown so big that it has become a target as well.<\/p>\n<p>In addition, as I <a target=\"_blank\" href=\"http:\/\/www.washingtonsblog.com\/2011\/07\/pentagon-seeks-to-manipulate-social-media-for-propaganda-purposes.html\" title=\"pointed out\" >pointed out<\/a> last year [for ease of reading, we&#8217;ll skip indentation]:<\/p>\n<p>Wired <a href=\"http:\/\/www.wired.com\/dangerroom\/2011\/07\/darpa-wants-social-media-sensor-for-propaganda-ops\/\" title=\"reported\"  target=\"_blank\">reported<\/a> on Friday:<\/p>\n<p>The Pentagon is looking to build a tool to sniff out social media propaganda campaigns and spit some counter-spin right back at it.<\/p>\n<p>On Thursday, Defense Department extreme technology arm Darpa unveiled its <a href=\"https:\/\/www.fbo.gov\/index?s=opportunity&amp;mode=form&amp;id=6ef12558b44258382452fcf02942396a&amp;tab=core&amp;_cview=0\" title=\"Social Media in Strategic Communication\"  target=\"_blank\">Social Media in Strategic Communication<\/a> (SMISC) program. It\u2019s an attempt to get better at both detecting and <strong>conducting propaganda campaigns on social media<\/strong>. SMISC has two goals. First, the program needs to help the military better understand what\u2019s going on in social media in real time \u2014 particularly in areas where troops are deployed. Second, Darpa wants SMISC to <strong>help the military play the social media propaganda game itself<\/strong>.<\/p>\n<p>This is more than just checking the trending topics on Twitter. The Defense Department wants to deeply grok social media dynamics. So SMISC algorithms will be aimed at discovering and tracking the \u201cformation, development and spread of ideas and concepts (memes)\u201d on social media, according to Darpa\u2019s announcement.<\/p>\n<p>***<\/p>\n<p>SMISC needs to be able to seek out \u201cpersuasion campaign structures and influence operations\u201d developing across the social sphere. SMISC is supposed to quickly flag rumors and emerging themes on social media, figure out who\u2019s behind it and what. Moreover, Darpa wants SMISC to be able to actually figure out whether this is a random product of the hivemind or a propaganda operation by an adversary nation or group.<\/p>\n<p>Of course, SMISC won\u2019t be content to just to hang back and monitor social media trends in strategic locations. <strong>It\u2019s about building a better spin machine for Uncle Sam<\/strong>, too. Once SMISC\u2019s latches on to an influence operation being launched, it\u2019s supposed to help out in \u201ccountermessaging.\u201d<\/p>\n<p>***<\/p>\n<p>SMISC is yet another example of how the military is becoming very interested in what\u2019s going on in the social media sphere.<\/p>\n<p>Indeed, as I <a target=\"_blank\" href=\"http:\/\/www.washingtonsblog.com\/2011\/02\/you-know-those-obnoxious-posters-who-almost-seem-like-alter-egos-of-the-same-person-they-actually-might-be.html\" title=\"wrote\" >wrote<\/a> in February:<\/p>\n<p>I <a target=\"_blank\" href=\"http:\/\/www.washingtonsblog.com\/2009\/01\/does-the-government-manipulate-social-media.html\" title=\"noted\" >noted<\/a> in 2009, in an article entitled \u201cDoes The Government Manipulate Social Media?\u201d:<\/p>\n<p>The U.S. government long ago announced its intention to <a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/americas\/4655196.stm\" title=\"\u201cfight the net\u201d\"  target=\"_blank\">\u201cfight the net\u201d<\/a>.<\/p>\n<p>As revealed by an official Pentagon report signed by Rumsfeld called \u201cInformation Operations Roadmap\u201d:<\/p>\n<p>The roadmap [contains an] acknowledgement that information put out as part of the military\u2019s psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans.<\/p>\n<p>\u201cInformation intended for foreign audiences, including public diplomacy and Psyops, is increasingly consumed by our domestic audience,\u201d it reads.<\/p>\n<p>\u201cPsyops messages will often be replayed by the news media for much larger audiences, including the American public,\u201d it goes on.<\/p>\n<p>***<\/p>\n<p>\u201cStrategy should be based on the premise that the Department [of Defense] will \u2018fight the net\u2019 as it would an enemy weapons system\u201d.<\/p>\n<p>Indeed, the Pentagon publicly <a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/americas\/1830500.stm\" title=\"announced\"  target=\"_blank\">announced<\/a> years ago that it was considering using \u201cblack propaganda\u201d \u2013 in other words, knowing lies.<\/p>\n<p>CENTCOM announced in 2008 that a team of employees would be <a href=\"http:\/\/www.rawstory.com\/news\/2006\/Raw_obtains_CENTCOM_email_to_bloggers_1016.html\" title=\"\u201c[engaging]   bloggers who are posting inaccurate or untrue information, as well as   bloggers who are posting incomplete information.\u201d\"  target=\"_blank\">\u201c[engaging] bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information.\u201d<\/a><\/p>\n<p>The <a href=\"http:\/\/blog.wired.com\/defense\/2009\/01\/usaf-blog-respo.html\" title=\"Air Force\"  target=\"_blank\">Air Force<\/a> is now also engaging bloggers. Indeed, an Air Force spokesman said:<\/p>\n<p>\u201cWe obviously have many more concerns regarding cyberspace than a typical Social Media user,\u201d Capt. Faggard says. \u201cI am concerned with how insurgents or potential enemies can use Social Media to their advantage. It\u2019s our role to provide a clear and accurate, completely truthful and transparent picture for any audience.\u201d<\/p>\n<p>In other words, the government is targeting \u201csocial media\u201d, including popular user-ranked news sites.<\/p>\n<p>In addition, when you look at what the Israeli lobby has done with Megaphone software to automatically vote stories questioning Israel down and to send pro-Israel letters to politicians and media (see <a href=\"http:\/\/www.guardian.co.uk\/commentisfree\/2009\/jan\/09\/israel-foreign-ministry-media\" title=\"this\"  target=\"_blank\">this<\/a>, <a href=\"http:\/\/www.guardian.co.uk\/media\/2006\/nov\/20\/mondaymediasection.israel\" title=\"this\"  target=\"_blank\">this<\/a> and <a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2009\/01\/03\/AR2009010301993.html\" title=\"this\"  target=\"_blank\">this<\/a>), you can start to see how the U.S. military \u2013 an even larger and better-funded organization \u2013 could substantially influence voting on social news sites with very little effort.<\/p>\n<p>Moreover,the military has outsourced many projects to private contractors. For example, in Iraq, much of the fighting has been outsourced to Blackwater. And <a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2007\/07\/06\/AR2007070601993.html\" title=\"governmental intelligence functions have largely been outsourced to private companies.\"  target=\"_blank\">governmental intelligence functions have largely been outsourced to private companies.<\/a><\/p>\n<p>It is therefore not impossible that the government is hiring cheap labor to downvote stories on the social media sites which question the government, and to post pro-government comments.<\/p>\n<p>(other governments and large companies \u201castroturf\u201d online as well. See <a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/7783640.stm\" title=\"this\"  target=\"_blank\">this<\/a>, <a href=\"http:\/\/news.slashdot.org\/story\/09\/07\/15\/1351204\/Internet-Astroturfer-Fined-300000?from=rss\" title=\"this\"  target=\"_blank\">this<\/a> and <a href=\"http:\/\/www.guardian.co.uk\/commentisfree\/libertycentral\/2010\/dec\/13\/astroturf-libertarians-internet-democracy\" title=\"this\"  target=\"_blank\">this<\/a><em>.<\/em>)<\/p>\n<p>I pointed out the same month:<\/p>\n<p>Government propagandists, their hired private contractors and useful idiots are creating \u201cdownvote bots\u201d or scripts to bury stories which question the government.<\/p>\n<p>***<\/p>\n<p>One free, simple scripting program to create automatic downvotes of certain topics or news posters is called \u201cGreasemonkey\u201d, which is commonly used on large social news sites such as Reddit.<\/p>\n<p>For example, there are some 2,480 hits \u2026 for the google search <a href=\"http:\/\/www.google.com\/search?hl=en&amp;client=firefox-a&amp;rls=org.mozilla%3Aen-US%3Aofficial&amp;hs=Hsj&amp;q=site%3Areddit.com+greasemonkey+downvote&amp;btnG=Search\" title=\"site:reddit.com greasemonkey downvote\"  target=\"_blank\">site:reddit.com greasemonkey downvote<\/a>. This is some 2,480 times that Reddit users are <em>publicly admitting<\/em> to using greasemonkey (see also <a href=\"http:\/\/www.google.com\/search?q=site%3Areddit.com+%22downvote+bots%22&amp;ie=utf-8&amp;oe=utf-8&amp;aq=t&amp;rls=org.mozilla:en-US:official&amp;client=firefox-a\" title=\"this\"  target=\"_blank\">this<\/a>).<\/p>\n<p>Propaganda agents obviously aren\u2019t going to publicly brag about what they are doing, and you can bet that their use of downvote bots is much greater. Moreover, they probably have more sophisticated software than Greasemonkey.<\/p>\n<p>Today, Raw Story <a href=\"http:\/\/www.rawstory.com\/rs\/2011\/02\/18\/revealed-air-force-ordered-software-to-manage-army-of-fake-virtual-people\/\" title=\"reports\"  target=\"_blank\">reports<\/a> that the Air Force ordered software to manage army of fake virtual people:<\/p>\n<p>Internet users would be well advised to ask another question entirely: Are my \u201cfriends\u201d even real people?<\/p>\n<p>In the continuing saga of data security firm HBGary, a new caveat has come to light: not only did they plot to help destroy secrets outlet WikiLeaks and discredit progressive bloggers, they also <strong>crafted detailed proposals for software that manages online \u201cpersonas,\u201d allowing a single human to assume the identities of as many fake people as they\u2019d like.<\/strong><\/p>\n<p>The revelation was among those contained in the company\u2019s emails, which were dumped onto bittorrent networks after hackers with cyber protest group \u201cAnonymous\u201d broke into their systems.<\/p>\n<p>In another document unearthed by \u201cAnonymous,\u201d one of HBGary\u2019s employees also mentioned <strong>gaming geolocation services to make it appear as though selected fake persons were at actual events. <\/strong><\/p>\n<p><strong>\u201cThere are a variety of social media tricks we can use to add a level of realness to all fictitious personas,\u201d it said.<\/strong><\/p>\n<p><strong>Government involvement<\/strong><\/p>\n<p>Eerie as that may be, more perplexing, however, is <a href=\"https:\/\/www.fbo.gov\/index?s=opportunity&amp;mode=form&amp;id=d88e9d660336be91552fe8c1a51bacb2&amp;tab=core&amp;_cview=1\" title=\"a federal contract\"  target=\"_blank\">a federal contract<\/a> from the 6th Contracting Squadron at MacDill Air Force Base, located south of Tampa, Florida, that solicits providers of \u201cpersona management software.\u201d<\/p>\n<p>While there are certainly legitimate applications for such software, such as managing multiple \u201cofficial\u201d social media accounts from a single input, the more nefarious potential is clear.<\/p>\n<p>Unfortunately, the Air Force\u2019s contract description doesn\u2019t help dispel their suspicions either. As the text explains, <strong>the software would require licenses for 50 users with 10 personas each, for a total of 500. These personas would have to be \u201creplete with background , history, supporting details, and cyber presences that are technically, culturally and geographacilly consistent.\u201d <\/strong><\/p>\n<p>It continues, noting the need for secure virtual private networks that <strong>randomize the operator\u2019s Internet protocol (IP) address, making it impossible to detect that it\u2019s a single person orchestrating all these posts<\/strong>. Another entry calls for static IP address management for each persona, making it appear as though each fake person was consistently accessing from the same computer each time.<\/p>\n<p>The contract also sought methods to anonymously establish virtual private servers with private hosting firms in specific geographic locations. This would allow that server\u2019s \u201cgeosite\u201d to be integrated with their social media profiles, effectively gaming geolocation services.<\/p>\n<p>The Air Force added that the \u201cplace of performance\u201d for the contract would be at MacDill Air Force Base, along with Kabul, Afghanistan and Baghdad. The contract was offered on June 22, 2010.<\/p>\n<p>It was not clear exactly what the Air Force was doing with this software, or even if it had been procured.<\/p>\n<p><strong>Manufacturing consent<\/strong><\/p>\n<p>Though many questions remain about how the military would apply such technology, the reasonable fear should be perfectly clear. \u201cPersona management software\u201d can be used to manipulate public opinion on key information, such as news reports. An unlimited number of virtual \u201cpeople\u201d could be marshaled by only a few real individuals, empowering them to create the illusion of consensus.<\/p>\n<p>***<\/p>\n<p>That\u2019s precisely <a href=\"http:\/\/www.dailykos.com\/story\/2011\/02\/16\/945768\/-The-HB-Gary-Email-That-Should-Concern-Us-All\" title=\"what got DailyKos blogger Happy Rockefeller in a snit\"  target=\"_blank\">what got DailyKos blogger Happy Rockefeller in a snit<\/a>: the potential for military-run armies of fake people manipulating and, in some cases, even manufacturing the appearance of public opinion.<\/p>\n<p>\u201cI don\u2019t know about you, but it matters to me what fellow progressives think,\u201d the blogger wrote. \u201cI consider all views. And if there appears to be a consensus that some reporter isn\u2019t credible, for example, or some candidate for congress in another state can\u2019t be trusted, I won\u2019t base my entire judgment on it, but it carries some weight.<\/p>\n<p>\u201cThat\u2019s me. I believe there are many people though who will base their judgment on rumors and mob attacks. And for those people, a fake mob can be really effective.\u201d<\/p>\n<p>***<\/p>\n<p>\u201cTeam Themis\u201d [<a href=\"http:\/\/www.rawstory.com\/rs\/2011\/02\/14\/us-chamber-hired-firm-to-investigate-families-and-children-of-critics\/\" title=\"tasked by the Chamber\"  target=\"_blank\">tasked by the Chamber<\/a> of Commerce to come up with strategies for responding to progressive bloggers and others] also included <a href=\"http:\/\/www.alternet.org\/newsandviews\/article\/479144\/plan_solicited_by_chamber_lawyers_included_malware_hacking_to_discredit_progressive_organizations\/\" title=\"a proposal\"  target=\"_blank\">a proposal<\/a> to use malware hacks against progressive organizations, and the submission of fake documents in an effort to discredit established groups.<\/p>\n<p>HBGary was also behind a plot by Bank of America to destroy WikiLeaks\u2019 technology platform, other emails revealed. The company was <a href=\"http:\/\/www.rawstory.com\/rs\/2011\/02\/07\/anonymous-hacks-security-firm-probed-membership\/\" title=\"humiliated by members of \u201cAnonymous\u201d\"  target=\"_blank\">humiliated by members of \u201cAnonymous\u201d<\/a> after CEO Aaron Barr bragged that he\u2019d \u201cinfiltrated\u201d the group.<\/p>\n<p>And see <a href=\"http:\/\/www.npr.org\/blogs\/thetwo-way\/2011\/03\/17\/134631649\/report-u-s-creates-fake-online-identities-to-counter-enemy-propaganda\" title=\"this\"  target=\"_blank\">this<\/a>, <a href=\"http:\/\/www.guardian.co.uk\/technology\/2011\/mar\/17\/us-spy-operation-social-networks\" title=\"this\"  target=\"_blank\">this<\/a>, <a href=\"http:\/\/www.centcom.mil\/en\/about-centcom\/posture-statement\/\" title=\"this\"  target=\"_blank\">this<\/a>, <a href=\"http:\/\/www.guardian.co.uk\/environment\/georgemonbiot\/2011\/feb\/23\/need-to-protect-internet-from-astroturfing\" title=\"this\"  target=\"_blank\">this<\/a>.<\/p>\n<p>***<\/p>\n<p><em>Postscript: Gaming social media is only one propaganda technique employed by the government:<\/em><\/p>\n<ul>\n<li><em>Famed Watergate reporter Carl Bernstein says <a href=\"http:\/\/carlbernstein.com\/magazine_cia_and_media.php\" title=\"the CIA has already bought and paid for many successful journalists\"  target=\"_blank\">the CIA has already bought and paid for many successful journalists<\/a><\/em><\/li>\n<\/ul>\n<ul>\n<li><em>The New York Times <a href=\"http:\/\/papercuts.blogs.nytimes.com\/2008\/01\/23\/the-cia-and-the-culture-war\/index.html?hp\" title=\"discusses\"  target=\"_blank\">discusses<\/a> in a matter-of-fact way the use of mainstream writers by the CIA to spread messages<\/em><\/li>\n<\/ul>\n<ul>\n<li><em>A <a href=\"http:\/\/video.google.com\/videosearch?q=%22the%20century%20of%20the%20self%22&amp;oe=utf-8&amp;rls=org.mozilla:en-US:official&amp;client=firefox-a&amp;um=1&amp;ie=UTF-8&amp;sa=N&amp;hl=en&amp;tab=wv\" title=\"4-part BBC documentary\"  target=\"_blank\">4-part BBC documentary<\/a> called the \u201cCentury of the Self\u201d shows that an American \u2013 Freud\u2019s nephew, Edward Bernays \u2013 created the modern field of manipulation of public perceptions, and the U.S. government has extensively used his techniques<\/em><\/li>\n<\/ul>\n<ul>\n<li><em>The Independent <a href=\"http:\/\/www.independent.co.uk\/news\/media\/how-the-spooks-took-over-the-news-780672.html\" title=\"discusses\"  target=\"_blank\">discusses<\/a> allegations of American propaganda<\/em><\/li>\n<\/ul>\n<ul>\n<li><em>And one of the premier writers on journalism <a href=\"http:\/\/www.dissidentvoice.org\/2007\/07\/the-invisible-government\/\" title=\"says\"  target=\"_blank\">says<\/a> the U.S. has used widespread propaganda<\/em><\/li>\n<\/ul>\n<p><a target=\"_blank\" href=\"http:\/\/www.globalresearch.ca\/index.php?context=va&amp;aid=29452#.T0fyBMlC4P4.facebook\" >Go to Original \u2013 globalresearch.ca<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facebook pays low-wage foreign workers to delete certain content based upon a censorship list. For example, it deletes accounts created by Palestinian resistance groups. Digg was caught censoring stories which were controversial or too critical of the government. See this and this. Now, even social media site Reddit \u2013 which helped launch the anti-Sopa Internet blackout and publicize GoDaddy\u2019s slimy Sopa support \u2013 is doing the same thing.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[62,60],"tags":[],"class_list":["post-17622","post","type-post","status-publish","format-standard","hentry","category-media","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/17622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=17622"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/17622\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=17622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=17622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=17622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}