Feeds

Facebookers made into fans of Berlsuconi in post-attack row

Souvenir-chuck reaction prompts censorship fears

The Power of One Infographic

Italian left-wingers claim a Facebook propaganda campaign has co-opted hundreds of thousands of users into groups supporting Silvio Berlusconi as he recuperates.

Yesterday, the Italian privacy commissioner was asked to investigate when Facebook users noticed they had mysteriously joined groups such as "We Support Berlusconi" and "Thank You Silvio", The Times reports.

Reaction to the attack on the Prime Minister and media baron has divided the nation, with his supporters taking to the web to wish him a speedy recovery, and his detractors applauding his alleged attacker, Massimo Tartaglia.

Berlusconi suffered a broken nose and two broken teeth when a metal model of Milan's Duomo was hurled at his face at a political rally on Sunday.

The government has signalled a potential action against social networking sites as a result. It said it would consider taking action to remove digital proclamations such as "We condemn all forms of violence, but the sight of Berlusconi's battered face is priceless" and calls for Tartaglia to be beatified.

The interior minister said online support for Tartaglia could prompt "a dangerous spiral of emulation".

"These are morally reprehensible messages inciting cowardly acts of violence against a popularly elected head of government," added Andrea Ronchi, the European affairs minister.

Opponents fear the Berlusconi government could be gearing up for a censorship crackdown online. The Prime Minister already owns much of Italy's media, which has supported him throughout a series of sex and corruption scandals in recent months.

Berlusconi himself has meanwhile sought a conciliatory tone this week. In a statement on his party's website, he said: "Everyone should stay calm and secure. Love always triumphs over envy and hate."

He has in the past suggested the internet should be more "regulated".

Facebook told Italian media it was monitoring groups discussing the attack for terms of use violations. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.