In the name of national security, former South Carolina governor and current Republican presidential candidate Nikki Haley wants to use government authority to ban anonymous speech on social media platforms.
“Every person on social media should be verified by their name,” she told Fox 69.
kAm}@ >2EE6C 9@H >2?J ?672C:@FD :>286D @7 #FDD:2? @C r9:?6D6 5:D:?7@C>2E:@? 286?ED @?6 4@?;FC6D FA[ E9:D :D 2 ?@\8@@5[ G6CJ 325 :562]k^Am
kAmp?@?J>@FD DA6649 :D 2 92==@H65 p>6C:42? EC25:E:@?] xE’D 92C5=J 2? 6I2886C2E:@? E@ D2J E92E :7 :E 925 ?6G6C 366? A6C>:EE65[ E96 &?:E65 $E2E6D 2D H6 <?@H :E >2J ?6G6C 92G6 6I:DE65] kDA2? 4=2DDlQAC:?E0EC:>Qm{6EE6CD 7C@> 2 u2C>6C :? !6??DJ=G2?:2[ D64C6E=J A6??65 3J y@9? s:4<:?D@?[ H6C6 :?DECF>6?E2= :? F?:E:?8 4@=@?:DED 282:?DE qC:E:D9 >:DCF=6]k^DA2?mk^Am
kAmp=6I2?56C w2>:=E@?[ y@9? y2J 2?5 y2>6D |25:D@? AF3=:D965 E96:C DE:CC:?8 u656C2=:DE 6DD2JD 5676?5:?8 E96 AC@A@D65 &]$] r@?DE:EFE:@? F?56C E96 AD6F5@?J> “!F3=:FD]” %9@>2D !2:?6[ q6?;2>:? uC2?<=:?[ %9@>2D y6776CD@? C68F=2C=J A6??65 >:DD:G6D H:E9@FE E96:C C62= ?2>6D 2EE24965]k^Am
kAmkDA2? 4=2DDlQAC:?E0EC:>Qmu@C 8@@5 C62D@?[ E96 EC25:E:@? 92D C6>2:?65 2=:G6 E9C@F89 E96 a`DE 46?EFCJ]k^DA2?m x? a_`g[ E96 }6H *@C< %:>6D AF3=:D965 2? @A\65 7C@> 2 E96?\2?@?J>@FD @77:4:2= H9@ AC@4=2:>65 E92E “E96 AC6D:56?E 4@?E:?F6D E@ 24E :? 2 >2??6C E92E :D 56EC:>6?E2= E@ E96 962=E9 @7 @FC C6AF3=:4]” s@?2=5 %CF>A[ @7 4@FCD6[ D2:5 :E H2D EC62D@?]k^Am
kAm~?6 42? BF6DE:@? E96 H:D5@> @7 2 ?6HDA2A6C 49@@D:?8 E@ D9:6=5 E96 :56?E:EJ @7 2? 25>:?:DEC2E:@? :?D:56C D66<:?8 E@ :?7=F6?46 AF3=:4 A@=:4J H:E9@FE 492==6?8:?8 E96 =682= C:89E E@ D6=7\AF3=:D9 F?56C 2 72=D6 ?2>6 @C ?@ ?2>6 2E 2==]k^Am
kAmp?@?J>@FD 2?5 AD6F5@?J>@FD 244@F?ED AC@=:76C2E6 @? #655:E 2?5 @? E96 A=2E7@C> @?46 <?@H? 2D %H:EE6C[ @7E6? AC@G:5:?8 6DD6?E:2= AC@E64E:@? E@ H9:DE=63=@H6CD 2?5 @E96CD H@CC:65 23@FE 36:?8 7:C65[ 6I4@C:2E65 @C 6G6? A9JD:42==J 92C>65]k^Am
kAm(:E9 C6DA64E E@ w2=6J[ E96C6’D 2? 6IEC2 :C@?:4 EH:DE 96C6] q24< :? pF8FDE a_aa[ D@>6@?6 :? E96 @77:46 @7 }6H *@C< pEE@C?6J v6?6C2= %:D9 y2>6D 3C@<6 E96 =2H 2?5 =62<65 E96 E2I C6EFC?D @7 2? 25G@424J 8C@FA w2=6J 7@F?565 42==65 $E2?5 7@C p>6C:42] !@=:E:4@ AF3=:D965 2 DE@CJ C6G62=:?8 5@?@CD’ :56?E:E:6D[ 2?5 96== 92E9 ?@ 7FCJ =:<6 E96 42?5:52E6 H9@D6 3:8\>@?6J 2==:6D H6C6 6IA@D65]k^Am
kAm“(6 2C6 ?@E 8@:?8 E@ E9C@H 4@EE@? 32==D 2E E96>[” D2:5 w2=6J @7 E96 pv’D @77:46] “(6’C6 8@:?8 E@ E9C@H 2 8C6?256[ 2?5 H6’C6 8@:?8 E@ >2<6 DFC6 E92E E96J <?@H 6?@F89 :D 6?@F89]”k^Am
kAmw6C 4@F?E6C2EE24< @? “=:36C2= 92C2DD>6?E” :D 4@?D:DE6?E H:E9 2 =@?8 =:?6 @7 4@?D6CG2E:G6 =682= E9@F89E E92E D2JD E96 C:89E E@ 8:G6 2?@?J>@FD=J E@ 2 A@=:E:42= 42FD6[ 6G6? @?6 4=@D6=J 2=:8?65 H:E9 2 DA64:7:4 42?5:52E6[ :D D24C65 3642FD6 7@C4:?8 A6@A=6 E@ C6G62= E96:C A6CD@?2= A@=:E:42= 4@>>:E>6?ED :D E@ @A6? E96> E@ 92C2DD>6?E]k^Am
kAmxE’D 2 72:C A@:?E] %2<6[ 7@C :?DE2?46[ E96 DF446DD7F= a__g 42>A2:8? E@ 32C D2>6\D6I >2CC:286 :? r2=:7@C?:2] |@DE 5@?@CD H6C6 >256 AF3=:4 F?56C =2H[ 2?5 “G:4E@CJ 92D 366? D@FC65 3J E96 F8=J DA64E6C @7 :?E:>:52E:@?[” C6A@CE65 E96 %:>6D] $@>6 @7 E9@D6 H9@ 82G6 E@ 8C@FAD 324<:?8 E96 AC@A@D:E:@? “92G6 C646:G65 562E9 E9C62ED 2?5 6?G6=@A6D 4@?E2:?:?8 2 A@H56CJ H9:E6 DF3DE2?46[ 2?5 E96:C 3FD:?6DD6D 92G6 366? 3@J4@EE65]”k^Am
kAmx? E96 :CC64@?4:=23=J :?4@?D:DE6?E >:?5 @7 }:<<: w2=6J[ :E :D F?4@?D4:@?23=6 :?E:>:52E:@? 7@C 8@G6C?>6?E E@ @FE E96 ?2>6D 2?5 4@?EC:3FE:@?D @7 >F=E:>:==:@?2:C6 4@?EC:3FE@CD ECJ:?8 E@ :?7=F6?46 E96 A@=:E:42= AC@46DD] qFE :E’D 2\~z 7@C E96 D2>6 8@G6C?>6?E E@ 7@C46 6G6CJ52J A6@A=6 H9@ A@DE @? %:<%@<[ %H:EE6C^)[ x?DE28C2> @C @E96C A=2E7@C>D E@ C6G62= E96:C :56?E:E:6D] #62==Jnk^Am