Media Manipulation and Bias Detection
Auto-Improving with AI and User Feedback
HonestyMeter - AI powered bias detection
CLICK ANY SECTION TO GIVE FEEDBACK, IMPROVE THE REPORT, SHAPE A FAIRER WORLD!
US/Western officials & media narrative (CNN, US government, private experts, Western cybersecurity researchers)
Caution! Due to inherent human biases, it may seem that reports on articles aligning with our views are crafted by opponents. Conversely, reports about articles that contradict our beliefs might seem to be authored by allies. However, such perceptions are likely to be incorrect. These impressions can be caused by the fact that in both scenarios, articles are subjected to critical evaluation. This report is the product of an AI model that is significantly less biased than human analyses and has been explicitly instructed to strictly maintain 100% neutrality.
Nevertheless, HonestyMeter is in the experimental stage and is continuously improving through user feedback. If the report seems inaccurate, we encourage you to submit feedback , helping us enhance the accuracy and reliability of HonestyMeter and contributing to media transparency.
Relying on prior narratives and repeated past incidents to support a current suspicion, even when direct evidence is limited.
“Iran has a history of targeting ATGs, making it the prime suspect in these breaches, but sources warned CNN that the hackers left little evidence to allow definitive identification.” The article leans on Iran’s past behavior to frame it as the ‘prime suspect’ despite explicitly acknowledging that there is little evidence for definitive attribution. The sequence of examples of Iranian-linked cyber activity (2015 mock ATG attacks, 2021 IRGC documents, post–October 7 incidents) reinforces the impression of Iranian guilt in the current case without presenting concrete technical evidence for this specific breach.
Rephrase to separate clearly between historical patterns and current evidence: “Iran has previously been linked to ATG-related cyber activity. Because of this history, some experts consider Iranian involvement a possibility in these breaches. However, sources told CNN that the hackers left little evidence, and no definitive attribution has been made.”
Add explicit mention of alternative possibilities or unknowns: “Attribution of cyberattacks is often complex, and other state or non-state actors could also be responsible.”
Clarify what specific indicators (if any) point to Iran in this incident, or state clearly that the suspicion is based primarily on past behavior rather than current forensic evidence.
Presenting a complex issue (cyber attribution and infrastructure security) in a way that suggests a single, straightforward cause or actor.
“Iran has a history of targeting ATGs, making it the prime suspect in these breaches…” The causal link ‘history of targeting ATGs → prime suspect now’ simplifies the multifaceted nature of cyber attribution, which typically involves technical indicators, geopolitical context, and multiple hypotheses. The article does not discuss other potential actors or the broader threat landscape, which can give readers the impression that Iran is the only plausible culprit.
Qualify the statement: “Because Iran has previously targeted ATGs, some officials consider it among the possible suspects in these breaches.”
Add a brief explanation of attribution complexity: “Cybersecurity experts note that attributing such breaches can be difficult, as multiple actors may use similar tools and techniques.”
Include mention of other generic threat actors (e.g., criminal groups, other states) to avoid implying a single obvious culprit without evidence.
Relying on the status of sources (officials, internal documents, media outlets) to support claims without providing sufficient underlying evidence.
Examples include: - “CNN reported, citing multiple sources.” - “CNN wrote, citing private experts and US officials.” - “Sky News cited internal documents from the Islamic Revolutionary Guard Corps (IRGC) singling out ATGs as a potential cyberattack target.” These references lean heavily on the credibility of CNN, US officials, and Sky News/IRGC documents without detailing the technical or documentary evidence behind the claims. While citing sources is appropriate, the article sometimes uses their authority as the main support for inferences (e.g., Iran as ‘prime suspect’) rather than presenting concrete indicators.
Where possible, summarize the nature of the evidence: e.g., “According to CNN, which reviewed network logs and spoke with two cybersecurity firms, the attackers accessed online ATG interfaces that lacked passwords.”
Clarify the limits of what the authorities actually know: “US officials told CNN they suspect Iranian involvement but did not provide technical indicators publicly to support this assessment.”
Distinguish clearly between verified facts (e.g., systems were online and not password-protected) and assessments or opinions (e.g., who is the ‘prime suspect’).
Using emotionally charged or security-framing language that can heighten fear or concern beyond what the described facts strictly support.
“However, a hacker with access to an ATG could potentially stop the detection of a gas leak, CNN wrote, citing private experts and US officials.” This hypothetical scenario is plausible but is presented immediately after noting that in this case hackers only changed display readings and caused no physical damage. The juxtaposition can amplify fear about catastrophic outcomes, even though the article does not indicate that such an attempt occurred in this incident.
Clarify that the scenario is hypothetical and distinguish it from what actually happened: “Experts note that, in general, a hacker with access to an ATG could potentially interfere with gas leak detection. In this incident, however, there is no evidence that the attackers attempted such actions; they only altered display readings.”
Provide context on likelihood and mitigations: “Cybersecurity specialists say such worst-case scenarios are technically possible but typically require additional conditions, such as access to other systems and lack of safety redundancies.”
Balance the risk framing by also mentioning existing safety measures or industry standards, if known.
Presenting one side’s claims and interpretations extensively while offering little or no space for responses or alternative perspectives from the other side.
The article repeatedly cites US officials, private experts, CNN, Sky News, and The Jerusalem Post, and details multiple alleged or suspected Iranian-linked operations. There is no mention of any response, denial, or alternative framing from Iranian officials, Iranian cybersecurity experts, or independent third-party analysts who might question or nuance the attribution. For example: - “Iran has a history of targeting ATGs, making it the prime suspect in these breaches…” - “Iranian hacking groups have interfered with multiple US infrastructure systems online…” - “After the October 7th massacre, IRGC-affiliated hackers breached US water utility systems…” All of these are presented from Western or Israeli media and official perspectives, without any Iranian-side comment or independent verification beyond those same circles.
Include any available official Iranian response or denial, or explicitly state that none was available at time of publication: “Iranian officials did not immediately respond to a request for comment.”
Add independent expert commentary that is not directly tied to US or Israeli government sources, to provide a broader analytical view of the cyber landscape and attribution claims.
Clearly label some statements as allegations: e.g., “US officials allege that Iranian hacking groups have interfered with multiple US infrastructure systems…”
Presenting claims in a way that may imply stronger evidence or broader consensus than is actually provided in the text.
“Iranian hacking groups have interfered with multiple US infrastructure systems online, which interact with oil and gas sites and water systems.” This is a broad claim about ‘multiple’ systems and ‘interfered’ activity, but the article does not specify which incidents, when they occurred, or how interference is defined (e.g., scanning, access, disruption). Similarly, the statement “Since the war began, Iran-linked hackers have caused disruptions at US oil and gas and water sites, and delayed shipping at a medical device maker, Stryker” is not accompanied by detail on the scale, duration, or independent confirmation of these disruptions.
Add specific examples and dates, or link each claim to a particular incident: “For example, in [month/year], [named group] was reported to have accessed [specific system], according to [source].”
Clarify the severity and nature of ‘interference’ and ‘disruptions’: e.g., “brief website outages,” “temporary loss of monitoring data,” or “no impact on physical operations.”
If details are not available, qualify the language: “US officials say they believe Iranian-linked hackers have attempted to interfere with multiple US infrastructure systems…”
Arranging events into a coherent story that suggests a continuous, intentional pattern, which may overstate the degree of coordination or causality.
The article strings together: historical ATG targeting (2015 mock systems, 2021 IRGC documents), post–October 7 water utility breaches, disruptions at US oil/gas/water sites, and Handala’s various leaks and ‘exposes.’ This creates a narrative of a steadily escalating, coordinated Iranian cyber campaign. While some connections may be real, the article does not distinguish clearly between separate groups, operations, and levels of state control, nor does it explore alternative explanations (e.g., opportunistic hacktivism, copycat behavior).
Explicitly distinguish between different actors and levels of attribution: “Handala is described as an Iranian regime-backed hacktivist group, but independent analysts differ on the extent of direct state control.”
Note uncertainties and gaps: “It is unclear whether these incidents are part of a single coordinated campaign or separate operations by different groups with overlapping motivations.”
Avoid language that implies a single, unified strategy unless supported by evidence; instead, use formulations like “a series of incidents involving groups linked to or supportive of Iran.”
- This is an EXPERIMENTAL DEMO version that is not intended to be used for any other purpose than to showcase the technology's potential. We are in the process of developing more sophisticated algorithms to significantly enhance the reliability and consistency of evaluations. Nevertheless, even in its current state, HonestyMeter frequently offers valuable insights that are challenging for humans to detect.