Connect with us
[the_ad id="89560"]

Censorship Industrial Complex

Congressional investigation into authors of ‘Disinformation Dozen’ intensifies

Published

13 minute read

From LifeSiteNews

By Dr. Michael Nevradakis of The Defender

The Center for Countering Digital Hate, authors of ‘The Disinformation Dozen,’ faces a Nov. 21 deadline to provide Congress with documents related to its alleged collusion with the Biden administration and social media platforms to censor online users.

The Center for Countering Digital Hate (CCDH), authors of the “Disinformation Dozen,” faces a Nov. 21 deadline to provide Congress with documents related to its alleged collusion with the Biden administration and social media platforms to censor online users.

Rep. Jim Jordan (R-Ohio), chairman of the House Judiciary Committee, on Nov. 7 subpoenaed CCDH  as part of an ongoing congressional investigation, launched in August 2023, into the nonprofit’s censorship-related activities.

The subpoena requests all communications and documents “between or among CCDH, the Executive Branch, or third parties, including social media companies, relating to the identification of groups, accounts, channels, or posts for moderation, deletion, suppression, restriction, or reduced circulation.”

The subpoena also requests all records, notes, and other “documents of interactions between or among CCDH and the Executive Branch referring or relating to ‘killing’ or taking adverse action against Elon Musk’s X social media platform (formerly Twitter).”

 

CCDH previously included Kennedy on its “Disinformation Dozen” list, published in March 2021, of the 12 “leading online anti-vaxxers.”

Leaked CCDH documents released last month by investigative journalists Paul D. Thacker and Matt Taibbi revealed that CCDH sought to “kill” Twitter and launch “black ops” against Robert F. Kennedy Jr., President-elect Donald J. Trump’s nominee for secretary of the U.S. Department of Health and Human Services (HHS).

Black ops” are defined as a “secret mission or campaign carried out by a military, governmental or other organization, typically one in which the organization conceals or denies its involvement.”

A subsequent report by Taibbi and Thacker showed that CCDH employed tactics it initially developed to help U.K. Prime Minister Keir Starmer and the U.S. Democratic Party, to target Musk, Kennedy and others.

CCDH used ‘explicit military terminology’ to target speech

Thacker told The Defender the leaked documents “definitely spurred” Jordan’s subpoena.

Sayer Ji, the founder of GreenMedInfo, was also listed among “The Disinformation Dozen.” He said the leaked documents were “chilling” and that CCDH’s efforts were part of “the largest coordinated foreign influence operation targeting American speech since 1776.”

Ji told The Defender:

The leaked documents confirm what we experienced firsthand: CCDH wasn’t just targeting 12 individuals – we were test cases for deploying military-grade psychological operations against civilians at scale.

Just as the British Crown once used seditious libel laws to silence colonial dissent, CCDH’s operation expanded to silence hundreds of millions globally, from doctors sharing clinical observations to parents discussing vaccine injuries.

Ohio physician Dr. Sherri Tenpenny, also on “The Disinformation Dozen” list, told The Defender, “The exposure of the manipulation that went on behind the scenes to silence us is what we suspected, and now we know … We have the sad last laugh against their attacks. They are the ones with blood on their hands.”

Ji said CCDH’s internal communications reveal not just bias, “but explicit military terminology – ‘black ops,’ ‘target acquisition,’ ‘strategic deployment’ – coordinated between Five Eyes networks and dark money interests to target constitutionally protected speech.”

Writing on GreenMedInfo, Ji said, “CCDH’s ‘black ops’ approach includes coordinated media smears, economic isolation, and digital censorship.” Ji said CCDH’s activities represent “a new level of institutionalized power directed at civilian targets, often bypassing constitutional safeguards.”

Thacker said Jordan’s investigation should expand to include CCDH’s “black ops.”

“I don’t want to speculate on what CCDH was doing with ‘black ops’ against Kennedy,” Thacker said. “I think that should be explored by a congressional committee, with CCDH CEO Imran Ahmed put under oath,” Thacker said.

CCDH facing multiple lawsuits, possible Trump administration investigation

Jordan’s subpoena is the latest in a series of legal challenges for CCDH. According to GreenMedInfo, the organization faces several lawsuits and government investigations.

Following last month’s CCDH document leak, the Trump campaign said an investigation into CCDH “will be at the top of the list.”

The campaign also filed a complaint against the Harris campaign with the Federal Election Commission, “for making and accepting illegal foreign national contributions” – namely, from the U.K. Labour Party.

This followed the release of evidence indicating that the Biden administration coordinated with the U.K. Foreign Office as part of what GreenMedInfo described “as a systematic censorship regime involving CCDH and affiliated organizations.”

lawsuit Musk filed against CCDH in July 2023 for allegedly illegally obtaining data and using it in a “scare campaign” to deter advertisers from X will likely proceed on appeal. A federal court initially dismissed the lawsuit in March.

Discovery in the Missouri v. Biden free speech lawsuit may also “shed further light and legal scrutiny on the critical role that CCDH played in allegedly suppressing and violating the civil liberties of U.S. citizens,” according to GreenMedInfo.

CCDH, others flee X in protest

Earlier this week, CCDH deleted its account on X, the platform it wanted to “kill.”

Writing on Substack, Ji said CCDH’s departure from X, during the same week Trump nominated Kennedy to lead HHS, represents a “seismic shift” and marks “a watershed moment, signaling the unraveling of entrenched systems of control and the rise of a new era for health freedom and open discourse.”

Several other left-leaning organizations and individuals, including The Guardian and journalist Don Lemon, also said they will stop using X, after Trump tapped Musk to lead a federal agency tasked with increasing government efficiency.

According to NBC News, many ordinary users are also fleeing X, citing “bots, partisan advertisements and harassment, which they all felt reached a tipping point when Donald Trump was elected president last week with Musk’s support.”

But according to Adweek, X’s former top advertisers, including Comcast, IBM, Disney, Warner Bros. Discovery and Lionsgate Entertainment, resumed ad spending on the platform this year, but at “much lower rates” than before.

“Elon Musk’s ties with Donald Trump might spur some advertisers to think spending on X is good for business,” Adweek reported.

Thacker said CCDH’s deletion of its X account was “aligned” with the departure of “other organizations and ‘journalists’ aligned with the Democratic Party.” He said it appears to have been a “coordinated protest.”

Ji said organizations like CCDH view X “as an existential threat.” He added:

Having experienced both Twitter 1.0’s AI-driven censorship system and X’s more open environment, I understand exactly why CCDH sees X as an existential threat. X represents what Twitter 1.0’s embedded censorship infrastructure was designed to prevent: a truly free digital public square.

Under Musk’s commitment to free speech, their tactical advantage disappeared. They’re not leaving because X is toxic. They’re leaving because they can’t control it.

Online censorship ‘may no longer be sustainable under intensified scrutiny’

According to GreenMedInfo, CCDH’s departure from X “appears to reflect an internal recognition that their operational model – characterized by critics as a US-U.K. intelligence ‘cut-out’ facilitating  unconstitutional suppression of civil liberties – may no longer be sustainable under intensified scrutiny.”

In recent months, several mainstream media outlets have corrected stories that relied upon CCDH reports claiming “The Disinformation Dozen” was responsible for up to two-thirds of vaccine-related “misinformation” online.

According to Thacker, this reflects an increasing awareness by such outlets that readers are turning their backs on such reporting.

“The outlets that promoted CCDH propaganda are being investigated by their own readers, who are fleeing in droves. Readers are voting against this type of propaganda by refusing to subscribe to these media outlets,” Thacker said.

Yet, “many outlets continue to host these demonstrably false narratives without correction,” Ji said.

According to Ji, these false narratives resulted in medical professionals fearing the loss of their licenses for expressing non-establishment views, self-censorship among scientists “to avoid career destruction,” suppression of “critical public health discussions” and the labeling of millions of posts as “misinformation.”

“This isn’t just about suppressing speech. It’s about establishing a new form of digital control that echoes the colonial-era suppression our founders fought against,” Ji said.

“CCDH has polluted political discourse by pretending there is some absolute definition of the term ‘misinformation’ and that they hold the dictionary,” Thacker said. “That’s nonsense. They spread hate and misinformation to attack perceived political enemies of the Democratic Party.”

Ji called upon Congress to investigate “The full scope of those silenced beyond the ‘Disinformation Dozen,’” the “systematic suppression of scientific debate,” “media organizations’ role in amplifying foreign influence operations” and “dark money funding networks” supporting such organizations.

Thacker said Congress should examine possible CCDH violations of the Foreign Agents Registration Act. “We need to also look at how much foreign money they took in and whether we as a nation are comfortable with foreign influence trying to alter the law and political discussions.”

“The fight isn’t just about correcting past wrongs or personal vindication. It’s about preserving fundamental rights to free speech and scientific inquiry in the digital age,” Ji said. “If we don’t address this systematic abuse of power, we risk surrendering the very freedoms our founders fought to establish.”

This article was originally published by The Defender – Children’s Health Defense’s News & Views Website. Please consider subscribing to The Defender or donating to Children’s Health Defense.

Business

Apple removes security feature in UK after gov’t demands access to user data worldwide

Published on

From LifeSiteNews

By Emily Mangiaracina

The decision was otherwise roundly condemned on X as “horrific,” “horrendous,” the hallmark of a “dictatorship,” and even “the biggest breach of privacy Western civilization has ever seen.”

Continue Reading

Censorship Industrial Complex

Bipartisan US Coalition Finally Tells Europe, and the FBI, to Shove It

Published on

FLICKER OF HOPE? Left, Senator Ron Wyden. Middle, Director of National Intelligence Tulsi Gabbard. Right, Rep. Andy Biggs

Racket News  By Matt Taibbi

While J.D. Vance was speaking in Munich, the U.K. was demanding encrypted data from Apple. For the first time in nine years, America may fight back

Last Friday, while leaders around the Western world were up in arms about J.D. Vance’s confrontational address to the Munich Security Council, the Washington Post published a good old-fashioned piece of journalism. From “U.K. orders Apple to let it spy on users’ encrypted accounts”:

Security officials in the United Kingdom have demanded that Apple create a back door allowing them to retrieve all the content any Apple user worldwide has uploaded to the cloud, people familiar with the matter told The Washington Post.…

[The] Home Secretary has served Apple with… a technical capability notice, ordering it to provide access under the sweeping U.K. Investigatory Powers Act of 2016, which authorizes law enforcement to compel assistance from companies… The law, known by critics as the Snoopers’ Charter, makes it a criminal offense to reveal that the government has even made such a demand.

This rare example of genuine bipartisan cooperation is fascinating for several reasons. Oregon’s Ron Wyden teamed up with Arizona Republican Congressman Andy Biggs to ask new Director of National Intelligence Tulsi Gabbard for help in beating back the British. While other Democrats like Michael Bennet and Mark Warner were smearing Gabbard as a Russian proxy in confirmation hearings, Wyden performed an homage to old-school liberalism and asked a few constructive questions, including a request that Gabbard recommit to her stance against government snatching of encrypted data. Weeks later, the issue is back on the table, for real.

The original UK demand is apparently nearly a year old, and Apple has reportedly been resisting internally. But this show of political opposition is new. There has been no real pushback on foreign demands for data (encrypted or otherwise) for almost nine years, for an obvious reason. Europe, the FBI, and the rest of the American national security apparatus have until now mostly presented a unified front on this issue. In the Trump era especially, there has not been much political room to take a stand like the one Wyden, Biggs, and perhaps Gabbard will be making.

The encryption saga goes back at least ten years. On December 2, 2015, two men opened fire at the Inland Center in San Bernardino, killing 14 and injuring 22. About two months later, word got out that the FBI was trying to force Apple to undo its encryption safeguards, ostensibly to unlock the iPhone of accused San Bernardino shooter Syed Rizwan Farook. The FBI’s legal battle was led by its General Counsel Jim Baker, who later went to work at Twitter.

One flank of FBI strategy involved overhauling Rule 41 of the Rules of Criminal Procedure. The FBI’s idea was that if it received a legal search warrant, it should be granted power to use hacking techniques, if the target is “concealed through technological means.” The Department of Justice by way of the Supreme Court a decade ago issued this recommendation to Congress, which under a law called the Rules Enabling Act would go into force automatically if legislation was not passed to stop it. In 2016, Wyden joined up with Republican congressman Ted Poe to oppose the change, via a bill called the Stopping Mass Hacking Act.

Two factors conspired to kill the effort. First, the FBI had already won its confrontation with Apple, obtaining an order requiring the firm (which said it had no way to break encryption) to write software allowing the Bureau to use “brute force” methods to crack the suspect’s password. While Apple was contesting, the FBI busted the iPhone anyway by hiring a “publicity-shy” Australian firm called Azimuth, which hacked the phone a few months after the attack. The Post, citing another set of “people familiar with the matter,” outed the company’s name years later, in 2021.

The broader issue of whether government should be allowed to use such authority in all cases was at stake with the “Stopping Mass Hacking” bill. It was a problem for the members that the FBI called its own shot in the San Bernardino case, but the fatal blow came on November 29, 2016, when the UK passed the bill invoked last week, called the Investigatory Powers Act. This legal cheat code gave agencies like Britain’s GHCQ power to use hacking techniques (called “equipment interference”) and to employ “bulk” searches using “general” warrants. Instead of concrete individuals, the UK can target a location or a group of people who “share a common purpose”:

THE IPA: Bulk warrants, warrants by location, warrants on groups with “common purpose”

The law was and is broad in a darkly humorous way. It mandates that companies turn over even encrypted data for any of three reasons: to protect national security, to protect the “economic well-being of the UK,” and for the “prevention or detection of serious crime.”

Once the Act passed, American opposition turtled. How to make a stand against FBI hacking when the Bureau’s close partners in England could now make such requests legally and without restriction? The Wyden-Poe gambits were wiped out, and just two days after the IPA went into effect, changes to Rule 41 in America did as well. These granted American authorities wide latitude to break into anything they wanted, provided they had a warrant. As one Senate aide told me this week, “That was a game-over moment.”

Once the British got their shiny new tool, they weren’t shy about using it. The Twitter Files were full of loony “IPA” dramas that underscored just how terrifying these laws can be. In one bizarre episode in August of 2021, Twitter was asked to turn over data on soccer fans to a collection of alphabet soup agencies, including the Home Office and the “Football Policing Unit.” The Football Police informed Twitter that “in the UK… using the ‘N word’ is a criminal offence — not a freedom of speech issue.”

Twitter executives scrambled to explain to football’s cyber-bobbies that many of their suspects were black themselves, and tweets like “RAHEEM STERLING IS DAT NIGGA” were not, in fact, “hateful conduct.” (The idea that British police needed American executives to interpret sports slang is a horror movie in itself.) Accounts like @Itsknockzz and @Wavyboomin never knew how close they came to arrest:

N**** PLEASE: British police invoked the Investigatory Powers Act to get user information about nonwhite football fans

British overuse was obvious, but Twitter elected not to complain. They also kept quiet when American authorities began pushing for the same power. Though the Apple standoff aroused controversy, 50% of Americans still supported the FBI’s original stance against encryption, which seemed to embolden the Bureau. Senior officials began asking for the same virtually unlimited authority their friends in the UK (and soon after, Australia) were asserting. Donald Trump’s Attorney General, William Barr, seethed about encryption in a keynote speech at an International Cybersecurity Conference on July 23rd, 2019. The Justice Department was tiring of negotiations with tech companies on the issue, Barr said:

While we remain open to a cooperative approach, the time to achieve that may be limited. Key countries, including important allies, have been moving toward legislative and regulatory solutions. I think it is prudent to anticipate that a major incident may well occur at any time that will galvanize public opinion on these issues.

God knows what he meant about a “major incident” that “may well occur at any time,” but Barr was referring to the Investigatory Powers Act and imitator bills that by 2019 were being drafted by most U.S. intelligence partners.

Even without a central “incident,” European officials have been pursuing the dream of full “transparency” into user data ever since, often with support from American politicians and pundits. It was not long ago that Taylor Lorenz was writing outrage porn in the New York Times about the “unconstrained” and “unfettered conversations” on the Clubhouse App. As Lorenz noted, Clubhouse simply by being hard to track aroused the hostility of German authorities, who wrote to remind the firm about European citizens’ “right to erasure” and “transparent information”:

Providers offering services to European users must respect their rights to transparent information, the right of access, the right to erasure and the right to object.

Eventually, the EU tried to submarine end-to-end encryption through dystopian bills like “Chat Control,” which would have required platforms to actively scan user activity for prohibited behavior. This concept was widely criticized even in Europe, and in the States, which was mostly still in the grip of “freedom causes Trump” mania, TechCrunch called it “Hella Scary.”

Chat Control just barely stalled out in October, thanks to the Dutch, but Europe’s feelings about encryption were still more than made clear with this past summer’s arrest of Telegram founder Pavel Durov. That event was largely cheered in the U.S. press, where Durov was accused of actively “hiding illegal behavior,” and turning his platform into a “misinformation hot spot” used by “far right groups,” “neo-Nazis,” and “Proud Boys and QAnon conspiracy theorists.” The consensus was Durov himself was helping sink the concept of encryption.

“If we assume this becomes a fight about encryption, it is kind of bad to have a defendant who looks irresponsible,” was how Stanford Cyber Policy Analyst Daphne Keller described Durov to the New York Times after his arrest.

The Durov arrest may have marked the moment of peak influence for the cyber-spook movement. Though the Investigatory Powers Act was a major political surveillance tool, it was far from the only important law of its type, or the most powerful. The IPA was in fact just one of a long list of acronyms mostly unfamiliar to American news consumers, from France’s LCEN to Germany’s NetzDG to the EU’s TERREG as well as its Code of Practice on Disinformation and Code of Conduct on Countering Illegal Hate Speech Online, among many others. American authorities usually followed the pattern in the case of encryption and the IPA, doing informally what European counterparts were able to effect openly and with the force of law.

Now however it looks like efforts by government officials to completely wipe out encryption have failed, and events have taken a new turn. “Wild,” is how the Senate aide characterized the Wyden-Biggs letter, resuming another bipartisan fight put on hold nine years ago. “I’d forgotten what this looks like.”

IRONY ALERT: Germans protesting FBI efforts to break iPhone encryption, 2016

Subscribe to Racket News. 

For the full experience, become a paying subscriber.

Continue Reading

Trending

X