Preps and Solutions
(Sponsored Ads)
Block Cubed - Cryptocurrency and Blockchain News
  • 9 Predictions For Bitcoin And Cryptocurrency For The Second Half Of 2018
  • “This News Is Massive” Unikoin Gold (UKG) CEO Responds To Supreme Court Ruling That Legalizes Sports Betting
  • Blockchain Smart Contracts
  • Silver
    Strategic Relocation
    Recently Posted Articles and Videos
    Ready Nutrition - Homesteading and Preparedness
    Ready Gardens - A Ready Nutrition Company
    The Daily Sheeple
    The Prepper Website
    SGT Report
    The Daily Coin
    top Prepper Web Sites
    Featured Destinations
    The Liberty Mill
    Web Destinations

    Clarocet for Kids
    Silver

    Twitter CEO Confirms: Social Media Has A ‘Left-Leaning Bias’

    Mac Slavo
    August 20th, 2018
    SHTFplan.com
    Comments (22)
    Read by 578 people

    In a not-so-shocking interview with CNN, Twitter’s CEO Jack Dorsey admitted that social media has a left-leaning bias. But Dorsey claims that Twitter doesn’t ban over ideology, it will ban or “shadowban” over a user’s “behavior.”

    “The real question behind the question is, ‘Are we doing something according to political ideology or viewpoints?’ And we are not. Period. We do not look at content with regards to political viewpoint or ideology. We look at behavior,” Dorsey said according to The Washington Post. 

    What makes that statement by Dorsey completely wrong (if not a bold faced lie) and extremely disingenuous, is the fact that Twitter has “shadowbanned” many conservatives over ideology while ignoring the “bad behavior” of leftists, likey because they agree ideologically and politically. And they aren’t the only social media platform that’s taken this approach. Facebook has also suspended conservatives for posting the vile hate-filled messages they’ve received from leftists while allowing the left to continue to threaten and harass those who aren’t left-leaning.

    The Death Of Free Speech: Twitter Ramps Up CENSORSHIP Of ‘Hate Facts’

    We need to constantly show that we are not adding our own bias, which I fully admit is more left-leaning,” Dorsey said. “And I think it’s important to articulate our own bias and to share it with people so that people understand us. But we need to remove our bias from how we act and our policies and our enforcement.” 

    Dorsey’s comments come amid a growing debate over how tech companies influence public discourse by censorship and banning based on their own political bias. Apple, Facebook, YouTube, and Spotify have taken aggressive steps against right-leaning talk show host and Alex Jones for violating their “hate speech” policies. All Jones really is guilty of, is stating an opinion that those in charge disagree with and offering a different view than the “official narrative” we are being brainwashed into accepting, even when there are red flags and many unanswered questions. Spotify, Facebook, and YouTube removed Jones from their platforms, and Apple followed suit by removing the majority of podcasts published by Jones’s website, Infowars, from iTunes and its podcast apps.

    Eerie Censorship Precedent: Big Tech Proves Alex Jones’ Motto Correct

    In an interview with The Washington Post last week, Dorsey said he is rethinking core parts of Twitter to curb the spread of hate speech, harassment, and false news (news he disagrees with). He also told The Post that he’s experimenting with new features that would allow people to see alternative viewpoints and reduce “echo chambers.”

    “I think people see a faceless corporation . . . They don’t assume that humans are in it, or that they’re genuine or authentic,” Dorsey told CNN. “They just assume based on what the output is. And that’s on us. That’s on me.”

    We’ll see.  So far, social media has done away with free speech by purging their platforms of those who spout political opinions that are disagreeable to the left. The whole “fake news” frenzy is nothing more than a way to silence those who don’t conform to the ideology the left deems acceptable.  Anything that’s disagreeable becomes fake giving the left adequate reasoning to silence, censor, and ban.  And it’s all being done to the raucous cheers of those who are willing to become slaves to the government in an increasingly authoritarian regime. They say history repeats itself…

    The things that are going to be blocked are not going to be fake storiesThe things that are going to be blocked and censored, the things they are going to keep from people is going to be stuff they just don’t want you to focus on or know about.” – Melissa Dykes

    Click here to subscribe: Join over one million monthly readers and receive breaking news, strategies, ideas and commentary.
    The Most Trusted Tactical Gas Mask In The World
    Please Spread The Word And Share This Post

    Author: Mac Slavo
    Views: Read by 578 people
    Date: August 20th, 2018
    Website: www.SHTFplan.com

    Copyright Information: Copyright SHTFplan and Mac Slavo. This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to www.shtfplan.com. Please contact us for permission to reproduce this content in other media formats.

    22 Comments...

    Vote: Click here to vote for SHTF Plan as a Top Prepper Web Site
    1. Anonymous says:

      Well ………… Surprise, surprise, surprise!

      • Genius says:

        And in much more important news….
        Here is a reference for herbal healing for hundreds of conditions. From Mike Adams…

        ht tp://www.herbreference.com/

      • Anonymous , all of them need to be reined in for good reason and corrected to fairness or be disassembled and have limits and restrictions. Not unlike other corps and monopoly laws. They now control what used to be called the public square and nearly all discourse as a tool to mind fuck the masses to specific political agendas in a completely controlled and biased way. Not free speech at all. And again the smart phones at work as the receiver unit and the sending unit ! who coulda known ?

    2. Maranatha says:

      What a shock and an epiphany! This is like saying if a skunk sprays you, it will stink and nauseate you.

    3. TharSheBlows says:

      RE: Cell Phone Hacks and Identity Theft. A Day in the Life of Sally the Victim.

      For the purposes of this Comment, we’ll call this lady Sally. Sally is a nice lady, seems to do all the right things in life, she is ambitious, but is not that informed of how she will be taken advantage of by technology and evil people.

      Sally’s day starts like this. Sally gets up in the morning all excited about her trip that day for some business and seeing family who lives in another state. Sally finishes up her daily chores dumps her trash waste into the trash can and sets it out by the curb for the weekly trash pick-up(1st Hack). Then Sally uses her WiFi at home to upload her boarding pass to head off to the Airport. (2nd Hack). Then sally gets into her car and plugs in her cellphone to get it charged up for her trip. (3rd hack) as she listens to her Satellite radio singing along to the tunes (4th Hack). Then Sally arrives at the airport still with her Wifi on and enters the Airport (5th Hack). Then Sally checks in and heads out the departure terminal to await her plane. She gets out there and plugs in her phone in again to an airport charging station kiosk(6th Hack). Sally then gets on her plane and departs for that other city a few States away. When sally arrives at that arrival airport, her WiFi is still on (7th Hack), and then heads to the car rental office to pick up her car. She gets into the rental car and again plugs into the cigarette lighter to charge her cell phone (8th Hack), and heads down the road passing a fake cellphone tower(9th Hack) and stops to fil the rental car up using her debit card on an outside gas pump(10th Hack). Upon arrival at the hotel, Sally, with her cell phone WiFi still on, enters the Hotel (11th Hack), and checks in. She sees another hotel charging station and plugs in. (12th Hack), and also flips on her laptop in the hotel lobby using the hotel Wifi to check her detailed emails and to check her bank account for her bank balance, because she just got paid that day(13th Hack). Then Sally heads off to her room, plugs in again and checks her FaceBook Account(14th Hack), then showers and gets ready to head to her business meeting. But before Sally leaves the Hotel, she uses the ATM machine to withdraw some money (15th Hack). Sally is riding high because she is excited about her trip and seeing her family the next day. And BTW/ Sally can’t wait until the new 5G phone technology comes out, as he heard it will make life easier and faster, because it is the “Internet of Things.”(16th through the next 10,000 Hacks).

      But then reality hits Sally days later, when Sally gets home. Her bank account balance is drained, and her cell phone is no longer working, because someone else stole her identity, went to her cell phone carrier, and ordered 5 new Apple iPhones in her name using her credit card info, and the hacker had the services switched to the new phones with new sims cards, and is also using the same phone number, which Sally fully paid for. Life is great, eh Sally?

      **Answer, Turn off all WiFi and GPS Cell Monitoring, Disable Google Administrator on your cell phone and delete all Google Apps, Twitter and Facebook Accts. Buy a USB charging cord that does NOT have the DATA PIN in the connectors, Never plug into any outside Electrical Power sources ever with your cell phone or Lap top, and use your own solar charger to charge your devices on the fly. Never ever do any Banking on your cell phone period and Never take any money of a public ATM machine and Never use your debit card for anything but taking money out of your own banks ATM machine, and cover up your hand as you punch your pin number in. And NEVER EVER CHARGE YOUR CELL PHONE VIA YOUR LAPTOPS USB PORT, BECAUSE ALL YOUR INFO WILL BE SYNC’d, GRABBED OFF YOUR CELLL PHONE AND TRANSFERRED TO GOOGLE’S DATA BASE, AND UPLOADED TO GOOGLE. NEVER EVER CLICK ON UPDATES ON YOUR CELL PHONE, AS ALL THAT IS, IS A SCAM TO UPLOAD ALL OF YOUR COMS DATA, TRAVEL ROUTES, TIME AND DATE STAMPED TO GOOGLE. STAY SAFE FOLKS!! BE SMART and FORWARD THIS INFO ON TO ALL YOUR PEEPS.

    4. aljamo says:

      Censorship is across the board against both left and right truth tellers in the public arena, any opinion outside the control freak master planners is under attack. Saying that the left drives censorship does not make any sense. The warmongers are the merged uniparty, the citizen left have been antiwar for a long time. The political government left have sold them out for profit. So google is leftwing, that’s a laugher.

    5. TharSheBlows says:

      Twitter’s Dorsey is another Globalist scumbag. I’ve never been on the platform and never will. Twitter has weaponized its platform with fake accounts via US Military Special Operations Divisions, using fake accounts, during the Egypt’s Arab Spring Uprising, a social media army to scam the populace that a revolt is genuine and mass proliferated generically.
      Dorsey is a Fascist Globalist Scumbag.

      Another Article:
      “In countries like Egypt, Tunisia, and Yemen, rising action plans such as protests made up of thousands, have been organized through social media such Facebook and Twitter. “We use Facebook to schedule the protests” an Arab Spring activist from Egypt announced “and [we use] Twitter to coordinate, and YouTube to tell the world.” The role that technology has taken in allowing the distribution of public information such as the kinds stated by the aforementioned activist, had been essential in establishing the democratic movement that has helped guide abused civilians to overthrow their oppressor.”

      ** Notice how they fail to state the fact that Fake Twitter Accounts were set up, to set the tone with Fake info to sell their propaganda, as if it is genuine and generic. All Fake BS.

    6. kay123 says:

      How about serving an UNBIASED SERVICE?
      True, they own the site…..so they should be allowed
      to filter what they want. BUT…if a CONSERVATIVE
      site does the same thing……there will be h3ll to pay!!!

      Freedom of speech, freedom of expression and freedom
      of the press is a Constitutional guarantee.
      Foul language, porn, nudity or anything indecent, has
      no place in public use.
      Who are the biggest offenders of our rights??
      Demoncraps!!!

    7. wile e. coyote says:

      i have not been able to post on any site with my phone or anyone in my family. im on a new laptop now i called my wireless carrier and they couldnt figure it out either. i think conservatives are definitely being watched or listened to i should say . same thing happened to my buddy for giving the blacks hell. not cussing just stating facts. anyone else with these problems?

    8. Not like it’s been much different in the past…

      “Shortly, the public will be unable to reason or think for themselves. They’ll only be able to parrot the information they’ve been given on the previous night’s news.”

      ——————-Zbigniew Brzezinski——————-

      Brainwashing has been the game plan since the early 20th century when Eddie Bernays set the strategy for the media. Only difference is the medium…from newsprint to radio to teevee to internet…it’s mostly all been fake news from the start.

      Control of the population is the goal. It has, for the most part, succeeded. Not much you can do when you’re fighting the CIA, the NSA, the MSM and Hollywood. Social media is a covert program of the .gov.

      Jack Dorsey deserves a Dirty Sanchez.
      Volunteers needed…

      • TharSheBlows says:

        Just look up the CIA “Operation Mocking Bird” Its the MSM hijacked by the CIA in the 1950’s to form propaganda to support their military actions of rape and pillage across the Globe. All the same BS different day from these folks.

    9. All animals are created equal, but some animals are more equal. Orwell. Animal Farm.

    10. “we ban over ‘behavior’”

      Behavior, by it’s true definition is not concerned with speech.

      Rather it is an action in real life.

      _

    11. The Deplorable Renegade says:

      B from CA, I don’t play nice with libturds so they definitely won’t like my ‘behavior’, LOL.

    12. Beaumont says:

      We assume that the administration is free-market, even though the opposition is given legal privileges, in a trickle-down economy.

    13. Maranatha says:

      The standard answer is that social media is either a massive vanity press which publishes the non-paid drivel of billions…

      …OR that social media is a series of massive media companies affecting billions.

      There is however a third option.

      Imagine what would have happened if leftists controlled utilities in America. Unless you vocally and in written form supported the left, you could not have access to pure water.

      What if only leftists had access to public supplies of natural gas distribution?

      What if only leftists could use public supplies of electricity?

      What if HAM radio, radio communications, tv stations, film companies, newspapers, etc were only allowed to be operated by leftists?

      That is one way of looking at social media as a UTILITY distribution network.

      Now, if that is valid, and I think one can make a case that politicians pushed through initiatives to facilitate social media as a utility worldwide, then that IS SUBJECT to government regulation.

      If social media is allow to be only for leftists then it could harm the American republic just as much as restricting water, natural gas, electricity, and telecommunications.

      Why do you think cities regulate cable tv communications? For precisely this rationale of access and impartiality as otherwise only those of one mindset are communicating their ideas.

    14. Maranatha says:

      Imagine if HAM radio was regulated where you think you are broadcasting, but actually are squelched from anyone receiving the signal.

      Would we ever allow that to happen?

      Yet, that is what Twitter did as their members who are conservative published comments that then show up on their accounts like a journal entry, yet are squelched from appearing elsewhere on anyone else’s account.

    Leave a Reply

    XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

    Commenting Policy:

    Some comments on this web site are automatically moderated through our Spam protection systems. Please be patient if your comment isn't immediately available. We're not trying to censor you, the system just wants to make sure you're not a robot posting random spam.

    This web site thrives because of its community. While we support lively debates and understand that people get excited, frustrated or angry at times, we ask that the conversation remain civil. Racism, to include any religious affiliation, will not be tolerated on this site, including the disparagement of people in the comments section.

     

    Web Design and Content Copyright 2007 - 2015 SHTF Plan - When It Hits The Fan, Don't Say We Didn't Warn You - All Rights Reserved

    Our Supercharged Intel Xeon E5-2620 v4 Octo-Core Dual Servers are Powered By Liquid Web

    Dedicated IP Address: 69.167.174.108

    The content on this site is provided as general information only. The ideas expressed on this site are solely the opinions of the author(s) and do not necessarily represent the opinions of sponsors or firms affiliated with the author(s). The author may or may not have a financial interest in any company or advertiser referenced. Any action taken as a result of information, analysis, or advertisement on this site is ultimately the responsibility of the reader.

    SHTFplan is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.