The Internet Never Forgets: Fighting the Memory Hole

<

div class=”field field–name-body field–type-text-with-summary field–label-hidden”>

<

div class=”field__items”>

<

div class=”field__item even”>

If there is one axiom that we should want to be true about the internet, it should be: the internet never forgets. One of the advantages of our advancing technology is that information can be stored and shared more easily than ever before. And, even more crucially, it can be stored in multiple places.  

Those who back things up and index information are critical to preserving a shared understanding of facts and history, because the powerful will always seek to influence the public’s perception of them. It can be as subtle as organizing a campaign to downrank articles about their misdeeds, or as unsubtle as removing previously available information about themselves. 

This is often called “memory-holing,” after the incinerator chutes in George Orwell’s 1984 that burned any reference to the past that the government had changed. One prominent pre-internet example is Disney’s ongoing battle to remove Song of the South from public consciousness. (One can wonder if they might have succeeded if not for the internet). Instead of acknowledging mistakes, memory-holing allows powerful people, companies, and governments to pretend they never made the mistake in the first place.  

It also allows those same actors to pretend that they haven’t made a change, and that a policy rule or definition has always been the same. This creates an impression of permanency where, historically, there was fluidity. 

One of the fastest and easiest routes to the memory hole is a copyright claim. One particularly egregious practice is when a piece of media that is critical of someone, or just embarrassing to them, is copied and backdated. Then, that person or their agent claims their copy is the “original” and that the real article is “infringement.” Once the real article is removed, the copy is also disappeared and legitimate speech vanishes.  

Another frequent tacti

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Deeplinks

Read the original article: