What exactly were the Twitter Files about? By now, its settled into a near-consensus everywhere but on the right that the disclosures were of little consequence. This view only hardened after MSNBC anchor Mehdi Hasan challenged Matt Taibbi, the journalist most associated with the so-called Files, on several major reporting errors two weeks ago.
Taibbi had mixed up the timeline of the creation of the Election Integrity Partnership (EIP), the public-private project set up to monitor social media misinformation during the election, and had vastly overstated the number of tweets it had flagged for removal, from 2,890 tweets to 22 millionTaibbis most consequential claim, according to one commentator.
Most seriously, Hasan showed that in charging that the EIP was partnered with state entities, Taibbi had erroneously identified the Center for Internet Security (CIS), a private nonprofitas the CISA, the Department of Homeland Securitys (DHS) Cybersecurity and Infrastructure Security Agency. Adding an A to the end of CIS allowed Taibbi to make what Hasan called the false claim that the EIP was partnered with the government.
As the MSNBC chyron asked whether there was proof of [a] censorship regime, viewers were clearly left to think there wasnt. Since then, Hasan has said that Taibbis false identification of the CISA was key to his thesis. In a widely circulated post, Techdirt charged that it had been a key linchpin in the argument that the government was sending tweets for Twitter to remove, concluding that there remains no there there. Various pundits have since repeated these points, charging the entire scary censorship narrative has fallen apart.
For many, this was a gratifying end to the saga: A media figure that many viewed as having gone over to the Dark Side of the conservative culture wars was taken down on live television. But reducing the matter to an episode of media comeuppance does a profound public disservice when, despite Taibbis errors, the convergence of social media censorship and the national security establishment is both very real and deeply worrying.
And Taibbis critics overstatements are themselves deeply misleading. Take the issue of the CIS and the CISA. While Taibbi mixed up the two in his tweet, the fact that the CISA works with the EIP isnt remotely a false claim: The EIP itself openly says its partnership with CISA began under the Trump administration.
Meanwhile, though the CIS certainly isnt a government entity, its also received a little under $250 million of US government funding since 2008the vast majority of it from the DHS. By the CISs own admission, both its divisions on election security and broader cybersecurity, which work together, are funded by grants from the very same CISA in question. It openly calls its cybersecurity division a government entity and boasts members from all 50 states, 49 state capitals, as well as hundreds of local governments, tribal governments, and U.S. territories. The CISs president and CEO is a former US Air Force and Department of Energy official who sat on the Cyber Security Commission under Barack Obama, while its other executives and board members hail from government entities like the National Security Agency (NSA), the Pentagon, and of course, the DHS. It even has a handy infographic showing the close relationship between it and the CISA.
Theres no question that the CIS is a private nonprofit. But its one so intertwined with the DHS, and so deeply connected to the similarly named CISA, that the lines between private and government are awfully blurry.
But in many ways, the CIS/CISA issue is beside the point, because this was by no means the most important revelation regarding government involvement in tech censorship. The three letters conspicuously missing from criticisms of the Twitter files are F, B, and I, with the disclosures having laid bare the alarming extent of the role that the Federal Bureau of Investigation now plays in the companys content moderation policies.
Among the disclosures were the fact that the FBI was having monthly and even weekly meetings with Twitter executives to coordinate anti-misinformation efforts; that it was doing so in conjunction with entities like the DHS, the Department of Justice (DOJ), and the office of the Director of National Intelligence; that the Central Intelligence Agency and even, at one point, the NSA, were involved in such meetings; that in Twitters interactions with the FBI, former Head of Trust and Safety Yoel Roth considered the Bureau a proxy for the entire intelligence community as a whole; and that the FBI and Twitter have become closely enmeshed, through the voluminous hiring of former Bureau personnel, offers of temporary security clearances and classified information sharing, and the creation of special portals for it and other government agencies to flag content.
What did they do with this influence? Among other things, the FBI and other government entities regularly sent over lists and Excel spreadsheets of hundreds of problematic accounts and tweets, a deluge of censorship requests that Twitter employees were overwhelmed by; repeatedly pressured Twitter to find evidence of large-scale foreign disinformation that the company officials said didnt exist; were involved in what one employee called a sustained (If uncoordinated) effort by the I[ntelligence]C[ommunity] to push us to share more info & change our API policies, an effort that involved congressional staffers; and that US officials simultaneously had Twitter exempt from censorship their own propaganda accounts. While critics charge that theres no evidence of government censorship in the files, there are in fact numerous instances of employees acting on government requests, with Twitters former public policy chief acknowledging that it identifies misinformation via the FBI/DHS.
Readers like you make our independent journalism possible.
Twitter employees themselves didnt share the blas attitude of critics of the reporting. They were perturbed that the FBI was just doing keyword searches for [terms of service] violations when it flagged accounts. Even the companys former deputy general counsel Jim Bakerhimself a former FBI officialfound it odd that they are searching for violations of our policies. Roth was uncomfortable with the implications of state-controlled media the Bureaus increasingly aggressive demands brought up.
But you dont need Twitter bigwigs to explain why this is all troubling. Take the FBI, which just in recent years has turned its spying power on Black activists protesting police brutality in ways that the ACLU has said are built on anti-Black racial stereotypes, investigated and infiltrated the Standing Rock protest movement, and carried out a nationwide sweep of Muslim households on the eve of the 2016 election. There is alarming evidence of far-right sympathies within the Bureau and its collaboration with far-right extremists for the purpose of targeting anti-fascists. The FBI most recently made headlines for its role in the prosecution of Cop City protesters in Atlanta and its surveillance of connected activist groups.
Theres no shortage of scandals in the bloated DHS either, from its surveillance of journalists, activists, and anti-Trump protesters, to the overlap between it and the membership of the far-right Oath Keepers, to the tune of hundreds of its current and former employees. This is all against the backdrop of a wider policy strategy involving the DHS and the DOJ that views left-leaning activist movements like environmentalism, animal rights, and anti-capitalism as potential domestic terrorism.
This bias is evident in the Twitter files. The FBI flagged tweets supporting the George Floyd protests as potentially driven by foreign-controlled bots. It likewise incorrectly flagged leftist Catalonian accounts as being of Russian origin, while Taibbi reported that a list of hundreds of supposedly Iranian government-linked accounts included a former newspaper reporter and the left-wing outlet Truthout. Intelligence reports flagged thousands of accounts propagating anti-Bolsonaro/pro-Lula hashtags, referring to the far-right former president of Brazil and his leftist challenger, respectively.
That Twitter often resisted the FBI isnt especially encouraging either, since even it admitted it was fighting a losing battle. Commenting on Twitters resistance to one particular censorship request, one employee wrote that our window on that is closing, given that government partners are becoming more aggressive. When another employee found no links to Russia on a set of flagged accounts, they offered to try to find a stronger connection anyway.
Hasan played down these concerns by pointing out that Twitter officially acted on 40 percent of government requests, instead of 100 percent of them. This will be cold comfort to the many left-leaning users who have been on the other side of these requests. That includes the hundreds of Palestinian activists, journalists, and other users who have complained for years about being censored for alleged terms of service and other violations on the platform, which has become integral to Palestinian organizing. An internal report last year from Facebook, another platform that partners with the FBI to fight misinformation, determined that its policies had an adverse human rights impact on Palestinians democratic rights partly through greater over-enforcement against Arabic posts.
Little thought is being given to how such a censorship regime could be misused in the future. Indeed, national security agencies dont tend to give up power and shrink but to accumulate it and grow. And the Twitter Files show ample evidence of the government already pushing for exactly that.
Since taking over Twitter, Musk has slashed the platforms content moderation team, claiming that the censorship bureau was let go. But there is little reason to sleep soundly. Musk, whose businesses are highly reliant on government contracts, particularly from the Pentagon, has stopped Twitters practice of publishing regular transparency reports about government requests, raising the question of whether Musk has not so much ended the companys cooperation with the national security state as simply hidden it from public view. Musks free speech crusade has not extended to restoring the account of the group responsible for the 2020 BlueLeaks disclosures about police misconduct, and he has willingly gone along with the Modi governments censorship demands against critics in India, in line with his highly questionable definition of free speech as merely meaning censorship in accordance with whatever the law demands. Musks words of assurance arent credible either: in the same BBC interview in which he claimed to be resisting government censorship, he labeled as total bullshit the existence of a family emerald mine that he once openly boasted about.
But even if one holds the utmost faith in Musks free speech commitments, the Tesla billionaire wont own Twitter forever. And the kind of government role in social media censorship laid bare in the Twitter files extends to a variety of other industry partners like Facebook, which has shown an equally alarming propensity for censoring content that deviates from official US policy.
Get unlimited access: $9.50 for six months.
Will progressives be comfortable when the speech thats targeted for censorship doesnt concern elections and vaccines but instead that which undermines the publics trust in the courts and the financial system, or provokes violence against key infrastructureall of which the CISA has plans to target? And given the cyclical nature of politics, do they trust Donald Trump or whichever other Republican inevitably ends up in the White House someday to use these powers responsibly, let alone to share their views of what constitutes online misinformation? Progressives should remember that objections to War on Terror excesses were largely about how the sprawling, invasive national security state created after 9/11 could easily be hijacked by an unscrupulous, authoritarian leadera prophecy we got some taste of in Trumps response to the protests of 2020.
Government control of whats said on social media and the rest of the Internet is a hallmark of authoritarian systems that exist in countries like Russia and China. Theres good reason to worry that the enmeshment of social media platforms with the national security state outlined in the Twitter Files, if left unchecked, could lay the foundation for exactly that. Progressives will protest in outrage if and when this regime is weaponized by right-wing forces. But by then, it may prove too late.
Originally posted here:
What Were the Twitter Files? - The Nation
- Google researchers have cracked a key internet security tool - Recode [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Letter: Internet security is in jeopardy - INFORUM [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- New internet security device launched to safeguard schools against child abuse - Phys.Org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster - Gizmodo [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Data from internet-connected teddy bears held ransom, security expert says - Fox News [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Emsisoft Internet Security 2017.2.0.7219 - TechCentral.ie [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- What you need to know about 'Cloudbleed,' the latest internet security bug - Globalnews.ca [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Google cracks longtime pillar of internet security - MarketWatch [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- BullGuard | Internet Security and Antivirus protection ... [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet Storm Center - SANS Internet Storm Center [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet-connected 'smart' devices are dunces about security - ABC News [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Derry internet security expert warns that advanced internet technology 'a risk to us all' - Derry Now [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Firewall Test, Web Tools and Free Internet Security Audit ... [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security in the spotlight: How is the internet safer today than it was 20 years ago? - Mobile Business Insights (blog) [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Jim Mullen: Unsocial internet security | Columnists | auburnpub.com - Auburn Citizen [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security company launches a perfume line to promote cybersecurity - Mashable [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Internet security - Wikipedia [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Are you undermining your web security by checking on it with the wrong tools? - The Register [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bruce Schneier on New Security Threats from the Internet of Things - Linux.com (blog) [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Carpe Diem: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Motivation Monday: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Medical records of 26m patients at risk because of GP surgeries' failing internet security - The Sun [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Free Internet Security | Why Comodo Internet Security Suite ... [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Internet Security Software | Trend Micro USA [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Fix crap Internet of Things security, booms Internet daddy Cerf - The Register [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Internet of Things security: What happens when every device is smart and you don't even know it? - ZDNet [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- CUJO is cuter than Wall-E, and it's the only internet security device you'll ever need - Yahoo News [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- The Senate just voted to undo landmark rules covering your Internet privacy - Washington Post [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- What the Cloudbleed disaster says about the state of internet security - Information Age [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Google Has Declared Symantec Harmful To Internet Security - UPROXX [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Internet Security Analysts: North Korea Is Planning a Global Bank Heist - Breitbart News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Internet Security Firm Confirms WikiLeaks 'Vault 7' At Least 40 Cyberattacks Tied to the CIA - The Ring of Fire Network [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices - ZDNet [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- A Global Industry First: Industrial Internet Consortium and Plattform Industrie 4.0 to Host Joint IIoT Security ... - Business Wire (press release) [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- Mucheru urges private sector to boost investment in internet security - The Standard (press release) [Last Updated On: April 25th, 2017] [Originally Added On: April 25th, 2017]
- Cloudflare debuts a security solution for IoT - TechCrunch [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Russian-controlled telecom hijacks financial services' Internet traffic - Ars Technica [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Avira Internet Security Suite v15.0.26 - TechCentral.ie [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- NSA To Limit Some Collection Of Internet Communication - NPR [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- Report Indicates '10 Concerts' Facebook Trend Could Compromise Your Internet Security - Complex [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- "Improving the World" through Internet Security: Chatting with David Gorodyansky, CEO of AnchorFree - Huffington Post [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Don't Fall For This Tech Support Scam Targeting PC Users - KTLA [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Yikes! Antivirus Software Fails Basic Security Tests - Tom's Guide [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Watch Hackers Sabotage an Industrial Robot Arm - WIRED [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Decoding Internet Security: Spear phishing - Washington Post [Last Updated On: May 5th, 2017] [Originally Added On: May 5th, 2017]
- From the Desk of Jay Fallis: To internet vote, or not to internet vote - BarrieToday [Last Updated On: May 7th, 2017] [Originally Added On: May 7th, 2017]
- Crippling cyberattack continues to spread around the world - Los Angeles Times [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Cyber Security Experts: Russia Disproportionately Targeted by Malware - Voice of America [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- The Latest: 29000 Chinese institutions hit by cyberattack - ABC News [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- Cyberattack Aftershock Feared as US Warns of Its Complexity - New York Times [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- This week's poll: Priorities for improving internet security - The Engineer [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Akamai Releases First Quarter 2017 State of the Internet / Security Report - PR Newswire (press release) [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Do Macs get viruses? - PC Advisor [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Massive Ransomware Attack Underscores Threats To Internet Security - Benzinga [Last Updated On: May 19th, 2017] [Originally Added On: May 19th, 2017]
- Security News This Week: Hoo-Boy, Mar-a-Lago's Internet Is Insecure - WIRED [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Internet security firm calls for law to compel information sharing to ... - The Star, Kenya [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Check It Out: No need to unplug after reading books on internet security - The Columbian [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- How to beat security threats to 'internet of things' - BBC News - BBC News [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Best Mac antivirus 2017 - Macworld UK [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Avira, Kaspersky Top Windows 10 Antivirus Tests - Tom's Guide [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Paranoid about internet security? Here are the most secure OS options - The American Genius [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Blockchain Offers Hope for the Broken Internet - Fortune [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- New uses for RFID and security for the internet of things - Phys.Org [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Security Best Practices for the Internet of Things - Web Host Industry Review [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Internet infrastructure security guidelines for Africa unveiled - Premium Times [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- In addressing internet security issues, make sure to provide solutions - Minneapolis Star Tribune [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Whistic Partners with the Center for Internet Security to Extend the ... - PR Web (press release) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet Security Alliance: NIST framework metrics should focus on threats - Inside Cybersecurity (subscription) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China cyber-security law will keep citizens' data within the Great Firewall - The Register [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Cyber security: Africa gets Internet security guidelines - TheNewsGuru [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China to Implement Its First Law on Internet Security After Ransomware Attack - Sputnik International [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Decoding Internet Security: Ransomware - Washington Post [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet security upgrade on course - Business Daily (press release) (blog) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- What's the Safest Laptop For Internet Security? - HuffPost [Last Updated On: June 2nd, 2017] [Originally Added On: June 2nd, 2017]
- Every Day Is Internet Security Day - The Chief-Leader [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- 5 Reasons why internet security is crucial in 2017 - Techworm [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- Are Pop-Ups An Internet Security Threat? - Good Herald [Last Updated On: June 4th, 2017] [Originally Added On: June 4th, 2017]
- 3 Ways Software Programs Can Help With Internet Security in 2017 - Geek Snack [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- Inside Social Security: Make every day your internet security day - Santa Ynez Valley News [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- SOCIAL SECURITY: Every day is internet security day - Palm Beach Post [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]