Facebook refuses to remove doctored Nancy Pelosi video | The Guardian

Factcheckers put ‘partly false’ label on video that has been circulating since Thursday and viewed more than 2m timesJoin us for an online event with Eric Holder to discuss voter suppression in the 2020 election, Thursday at 5pm ET. Register nowFactcheckers monitoring content on Facebook have put a “partly false” label on the latest video that it said was manipulated to make it appear as if the House speaker, Nancy Pelosi, was drunk or drugged, but by Monday the social media giant had refused to remove the video from its platform.The video had been circulating on Facebook since Thursday and by Sunday night had been viewed more than 2m times, CNN reported. Continue reading…

Factcheckers put ‘partly false’ label on video that has been circulating since Thursday and viewed more than 2m times

Factcheckers monitoring content on Facebook have put a “partly false” label on the latest video that it said was manipulated to make it appear as if the House speaker, Nancy Pelosi, was drunk or drugged, but by Monday the social media giant had refused to remove the video from its platform.

The video had been circulating on Facebook since Thursday and by Sunday night had been viewed more than 2m times, CNN reported.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more