Content Moderation: Censorship and Shadow Banning

Contact Your Elected Officials

This investigation explores what “content moderation” is, otherwise known as censorship or shadow banning. Censorship occurs on tech platforms when content is removed for ideological reasons. Shadow banning is simply covert censorship that attempts to keep the censored unaware that he/she is being censored. I investigate how censorship and shadow banning occurs, expose precisely who develops these techniques, and reveal the economic motives of these programs.

Content moderation has roots in the CVE community, or counter-violent extremist community. Many CVE groups have developed content moderation techniques, but this article will focus on Jigsaw, a special CVE owned by Google. It is important to point out that the CVE community is separate from the technology platforms, but the Jigsaw-Google duo is an exception. With the data advantage of the Google search engine, preferential treatment on the Youtube platform, and support from much of the CVE community, Jigsaw is a formidable foe to freedom of information, privacy, and social networking. Jigsaw also produces unscientific reports of hate crimes, far-right extremism, and violent white supremacy[1] in order to market their programs.

  • For a review of Jigsaw’s (unscientific) disinformation campaign, click here.[1]
  • For a proper debunking of hate crime claims, click here.[2][3][4][5]
  • A proper debunking of far-right extremism/terrorism claims, click here.[6][7]

Now for the origin of shadow banning and a peculiar relationship between Jigsaw-Google and the New York Times.

ShadowBanning from the Source

The 1st Program

Jigsaw partnered with the New York Times on “content moderation” for the newspaper’s social media pages[8] and to test Jigsaw’s first shadow ban program, called Perspective API[9]. At that time, the program simply deleted or hid comments that clients (such as the New York Times) found disagreeable. A client could use the text-based AI program to highlight certain comments that the client could more conveniently browse, rather than browse through all comments to find “toxic” ones. The Client could also allow the text AI program to simply delete or hide the comments rather than be involved in the process at all. If this second option were the case, then many comments would never be viewable to other users, and some users may not realize that his/ her comment was hidden. This provides obscurity to the client and prevents the likelihood of user scrutiny. As this machine-learning (or text-based or speech-based AI) was improved, it expanded to include images and video as well as comments[9]. If a group has a platform or page that they want to implement content moderation on, they can use Perspective API to sift through comments before they are published on the site or have the program listen to video to determine if it needs to be taken down[9].

To summarize, Perspective API allowed platforms or specific pages to hide or delete comments/ content, and even do so before those comments are published online (such as a Youtube comment section). If content is hidden, it would not acquire more likes or comments or any other form of feedback, because other users could not see the hidden content. This program works without informing the user’s who’s content is hidden or deleted.

Surprisingly, marketing videos of Perspective API exist, though some have been deleted recently. Here is a link that does not work. I found this as a “case study” justifying the use of Perspective API, where the New York Times was the client. This may not be the first time that I have followed a suspicious story of the New York Times where the news agency deleted articles or pages[10]. For a link to a marketing video that works (for now), click here.

The 2nd Program

Jigsaw has another tool called Moderator, which is also open-sourced[11] (at least in it’s earlier days) so denying it’s existence has that hurdle to overcome. Oddly enough, Jigsaw’s Moderator was also a tool that they developed in partnership with the New York Times[12]. This is the second documented case of the New York Times social media pages being the testing grounds for shadow ban software.

Moderator is a text-based AI “that leverages Perspective to prioritize comments”[11][12]. Not only is the CVE deleting comments with Perspective API, but is also prioritizing certain comments with Moderator. It is still unclear if Moderator bypasses base algorithms of a platform to prioritize comments or if machine likes are added to these chosen comments to boost them to the top of a page or comment section.

Technically, some components of content moderation (shadow banning) are a form of censorship, such as Perspective API where opinions are suppressed. Moderator is more difficult to classify since it is preferential treatment of other opinions, rather than deleting opposing views. Nonetheless, the two together produce a result where a diversity of ideas cannot exist, and free speech is an afterthought.

The deleting and suppressing of comments, along with the preferential treatment that other comments receive, is irrefutably a result of Jigsaw and their programs. However, how do we know if Jigsaw is using these programs for the better good of all? Is the CVE truly so far-left that it suppresses innocuous opinions?

Are conservatives and the right-leaning targeted?

Jigsaw’s Justifications for Shadow Banning

Jigsaw’s disinformation projects[13] use “data” from the Atlantic Councilโ€™s Digital Forensic Research Lab (DFRLab). The DFRLab collects data based off of definitions of disinformation from several groups, including Facebook[14]. Contrary to the Jigsaw narrative on far-right extremism in North America, the DFRLab ranks Russia and Iran as the top sources of disinformation campaigns. The lab’s findings do not necessarily support the specific campaigns that Jigsaw wages, but as I found with dozens of Jigsaw’s citations, many were misinterpreted or misused entirely[1].

disinformation campaigns. The lab’s findings do not necessarily support the specific campaigns that Jigsaw wages, but as I found with dozens of Jigsaw’s citations, many were misinterpreted or misused entirely[1].

The DFRLab released two articles[15][16] of the Capitol riots where far-right extremism was characterized as being highly networked, and reaching millions of “sympathizers” โ€“ a claim I have thoroughly debunked. This claim sets up the CVE community neatly, so that they can tackle this problem with their software.

The DFRLab articles examined institutional outlets like Twitter, which were implied to be safer as opposed to the radical and dangerous “Parler, Gab, MeWe, Zello, and Telegram”[15][16]. How convenient for the CVE community, who want total network control. As with Jigsaw’s narrative about the white supremacy issue, Jigsaw’s narrative about disinformation leads the CVE to the conclusion that the world needs more network control from Google and other dominant platforms, as well as more authoritarian methods by the CVE community.

“The migration reiterates that the challenge of online extremism is not limited to any one platform but rather an entire, largely unregulated ecosystem with very few barriers to engage or disseminate content.โ€[16] This quote from the DFRLab highlights my claim about Jigsaw’s and the CVE’s conclusions; note their use of the term “unregulated”.

Furthermore, the DFRLab uses the appeal to authority fallacy without releasing data: “The team at the Atlantic Councilโ€™s Digital Forensic Research Lab has conducted exhaustive research”[16]. This statement is the only proof that the lab produces for their claims, and it would appear that a single appeal to authority is all that Jigsaw requires to implement shadow ban methods on millions. Youtube also commits the same logical fallacy when the platform defends their news bar by characterizing those pages as “authoritative” sources[17]. It is important to point out that users do not have the option to choose which pages show up in the Youtube news bar.

Conclusion

If it is not obvious already, the CVE community is using a small minority (a few thousand annually for hate crimes in the US; and about a hundred or less annually for terrorism globally) of sick, solitary individuals to characterize everyone that dissents. Jigsaw uses a mere 35 individuals to justify the CVE’s methods[1][12], and no empirical evidence is produced or cited. It is carefully planned wording to use “millions of sympathizers” when talking about these issues. The CVEs need to rely on storytelling because data, quantitative analysis, and statistics will only disprove the CVE claims about far-right extremism and white supremacy. They are not talking about protecting the world from extremists. They are talking about controlling people โ€“ innocent, normal people.

References

[1] Kelly C Offield. “Grand Manipulation: Google Edition”. The ARKA Journal. https://advocate-for-rights-and-knowledge-of-americans-arka.ghost.io/grand-manipulation/

[2] Kelly C Offield. “Progressive Movements: How Unscientific and Harmful Are They?”. The ARKA Journal. https://advocate-for-rights-and-knowledge-of-americans-arka.ghost.io/progressive-movements/

[3] https://ucr.fbi.gov/hate-crime/2019/topic-pages/offenders

[4] https://ucr.fbi.gov/crime-in-the-u.s/2019/crime-in-the-u.s.-2019/topic-pages/violent-crime

[5] https://statisticalatlas.com/United-States/Race-and-Ethnicity

[6] Kelly C Offield. “Grand Manipulation: The Extremist Myth.” The ARKA Journal. https://advocate-for-rights-and-knowledge-of-americans-arka.ghost.io/grand-manipulation-myths-ofthe-software-developers/

[7] Institute for Economics and Peace. “Global Terrorism Index 2019 Measuring the Impact of Terrorism.”https://www.visionofhumanity.org/wp-content/uploads/2020/11/GTI-2019-web.pdf

[8] Jigsaw partnership with New York Times. https://www.youtube.com/jigsaw

[9] Jigsaw. “Perspective API” https://www.perspectiveapi.com/how-it-works/

[10] Kelly C Offield. “Security State, Their Servants, and a Convenient Cyber Breech” The ARKA Journal. https://advocate-for-rights-and-knowledge-of-americans-arka.ghost.io/frightening-unions-and/

[11] Github. “Moderator” https://github.com/conversationai/conversationai-moderator

[12] Jigsaw. “Toxicity: Case Studies” https://jigsaw.google.com/the-current/toxicity/case-studies/

[13] Jigsaw. “Disinformation” https://jigsaw.google.com/the-current/disinformation/dataviz/

[14] DFRLab. “Dichotomies of Disinformation” Github. https://github.com/DFRLab/Dichotomies-of-Disinformation

[15] Atlantic Councilโ€™s Digital Forensic Research Lab. “What’s next for the insurrectionists” https://www.atlanticcouncil.org/content-series/fastthinking/fast-thinking-whats-next-for-theinsurrectionists/

[16] Atlantic Councilโ€™s Digital Forensic Research Lab. “How the Capitol Riot was Coordinated Online” [https://www.atlanticcouncil.org/content-series/fastthinking/fast-thinking-how-thecapitol-riot-was-coordinated-online/

[17] Youtube. “Greater Transparency for Users Around.” https://blog.youtube/news-and-events/greater-transparency-for-users-around/

Content Moderation: Censorship and Shadow Banning PDF

content-moderation-final

Kelly Offield
Kelly Offieldhttps://advocate-for-rights-and-knowledge-of-americans-arka.ghost.io/
Kelly Offield has a degree in physics from the University of Alaska Fairbanks. He has applied his degree in a variety of ways. Since February of 2021, he has been writing articles as an independent journalist. His work focuses on government agency corruption, corporate deceit, and questionable interests and can be read on His his website The ARKA Journal.

Meet the Fairy From Hell in Charge of Vaccines at CDC Until Last Week

Picture the creepiest leather-daddy gimp at your local Prideโ„ข festival. Thatโ€™s this guy, Demetre Daskalakis, who ran the entire federal govt vaccine program.

The Clinton-Epstein Connection We Did Not Know

One attorney's inside info about D.C. and the relationship the Clintonโ€™s had with the late child sex pedophile Jeffrey Epstein

Faith under fire

Over half of historyโ€™s 70M Christian martyrs were killed in the 20th century, amid totalitarian regimes, purges, and ethnic violence.

Exposed: Dem Dark Money Influencer Machine

After 2024 defeat, Democrats, launched Chorus Creator Program, paying influencers up to $8K/month to push party talking points as โ€œindependent media.โ€

Cherished Unalienable Rights

In the USA, the โ€œrightsโ€ of life, liberty, and the pursuit of happiness are written endowments, supposedly, held sacred, and secured and protected by govt.

As Banks Quit UN Climate Alliance, Critics Say Too Soon to Declare Victory

A global net-zero banking alliance has halted operations after mass member exits, with analysts citing legal risks rather than climate retreat.

Trump Calls on Pharmaceutical Companies to โ€˜Justify Successโ€™ of COVID-19 Vaccines

Trump on Sept. 1 urged pharmaceutical firms, including Pfizer, to release information they shared with him about their COVID-19 products.

Housing Authorities That Donโ€™t Share Citizenship Information Risk Losing Funding: HUD

Housing Secretary Scott Turner ordered housing authorities to prove tenantsโ€™ U.S. citizenship or eligible immigration status within 30 days.

AI Replacing Human Financial Planners? Experts Warn Against Overreliance

New study found that 64% of Americans are comfortable with AI creating financial plans but over half are uneasy with AI making investment decisions.

Trump Says India Offered Zero Tariffs After Decades of โ€˜One-Sidedโ€™ Trade

President Trump said India offered to cut tariffs on U.S. goods to zero, calling it a long-overdue fix for decades of one-sided trade.

Trump Says He Will Issue Executive Order to Require Voter ID

โ€œVoter I.D. Must Be Part of Every Single Vote. No exceptions!โ€ Trump wrote on a post on Truth Social. โ€œI Will Be Doing An Executive Order To That End!!!โ€

Appeals Court Rules Most of Trumpโ€™s Tariffs Are Illegal

The judges let the import taxes stay in place...

Trump Signs Executive Order โ€˜Making Federal Architecture Beautiful Againโ€™

Trump signed an EO to โ€œ[Make] Federal Architecture Beautiful Again,โ€ prioritizing classical and traditional styles in new federal govt. buildings.
spot_img

Related Articles