Former Eastonite David Carroll Featured in Netflix

Total Page:16

File Type:pdf, Size:1020Kb

Former Eastonite David Carroll Featured in Netflix Former Eastonite David Carroll Featured in Netflix Documentary ‘The Great Hack’ If you told the average social media user that their data had been stolen, chances are, they probably wouldn’t be in too much of a rush to reclaim it. Fortunately, David Carroll is not your average social media user. Professor Carroll is an associate professor at the Parsons School of Design in New York City, and the former director of the Master of Fine Arts Design and Technology program in Parson’s School of Art, Media and Technology. He is also the subject of the Netflix original documentary The Great Hack, a film that explores the data scandal involving social media giant Facebook and British political consulting firm Cambridge Analytica. The documentary underlines the controversial data harvesting conducted by Cambridge Analytica that occurred prior to the 2016 U.S. presidential election, as well as the significance of data security in the digital world. The film’s audience follows Carroll’s journey as he attempts to reclaim his data through a series of legal battles, which ultimately thrusts him into the national spotlight. But long before he was a data activist advocating for the implementation of online privacy legislation, Carroll was a third grader living in Easton, Conn., attending Samuel Staples Elementary school before advancing to Helen Keller Middle School for the sixth grade. “I have a lot of memories of those school grounds,” said Carroll, a 1993 graduate of Joel Barlow High School in Redding, Conn. “I remember picking strawberries from Candee Farm, and I knew the Silverman family and their town institution, because I knew their kids growing up.” Back then, phrases such as “data security,” “targeted social media advertisements,” and “the commercialization of the Internet,” weren’t in Carroll’s vocabulary. Today, however, Carroll is viewed as a pioneering force in the realm of data rights and a leading authority on data protection, and his presence in The Great Hack captures his passion for the issues that have become increasingly relevant during this ongoing period of rapid digital transformation. The film offers first-hand accounts from those who were directly involved with Cambridge Analytica and the 2016 Trump campaign. Through these perspectives, newcomers to the data security world can gain a better sense of the issues that affect them as consumers and citizens that were brought to the forefront of the technology industry as a result of the scandal. To briefly summarize, in the months leading up to the 2016 presidential election, Cambridge Analytica, a U.K.-based political consulting firm, was hired by Donald Trump’s campaign to assist with the implementation of strategic advertisement and sales strategies. During this time period, Cambridge Analytica’s team created data points on every American voter after analyzing user data from several mainstream social media platforms, with Facebook being the main source of information. These data points were then used to create content that was intended to influence a demographic known in the movie as “the Persuadables,” or the people whose minds data scientists at Cambridge Analytica thought they could change. At a glance, it sounds like a comprehensive and well-thought-out marketing plan. But there was one major problem: The data from Facebook was collected illegally, without the consent of the users themselves. Data Heist In an article posted to the company newsroom on April 4, 2019, Facebook’s Chief Technology Officer Mike Schroepfer announced the figure that everyone in the technology world and beyond was waiting to hear: 87 million. Cambridge Analytica collected and harvested the private information of about 87 million Facebook users, over 70 million of whom were U.S. residents Carroll believes that the lack of data privacy and overall data protection in the U.S. stems from an absence of legislation. “We don’t have a rights-based model,” explained Carrol. “In all other forms of our society we have rights-based models. “Europe has one, and so it’s easier to determine what is appropriate and what’s not. There are guidelines, a regulatory framework, and expectations based on the rights. In the U.S., we’re stuck between user expectation and business practice.” Carroll went on to discuss how this feeling of being “stuck” creates a trust gap between social media users and the companies behind their favorite platforms. When he himself found out that the Alexander Nix-led Cambridge Analytica had 5,000 data points on every U.S. voter, Carroll ditched the remaining trust he had in Silicon Valley and lawyered up. He then took his legal battle to Britain, where Cambridge Analytica had processed its user data through its parent company, Strategic Communications Laboratories Group (SCL). Because of the rights-based model that exists in the United Kingdom, Carroll was able to file a complaint to the Information Commissioner’s Office (ICO), which reports directly to the U.K. Parliament. Eventually, Cambridge Analytica’s work was determined to have violated multiple U.K. privacy laws, but not before its parent company, SCL, had filed for bankruptcy. When asked about the character of Alexander Nix, the CEO and face of Cambridge Analytica, Carroll was candid in his response. “I know he is willing to lie to lawmakers, so at the minimum he is a scoundrel in that regard,” said Carroll with a smirk. “The House Intelligence Committee just released its transcripts from the Russia investigation, so you can read Nix’s interview. He lied to Republicans and Democrats alike, and he lied to Parliament as well. He’ s just an unreliable narrator.” COVID-19 and Data Security This lack of trust with data security has increasingly come to the forefront of topical issues in the United States, as concerns regarding contact tracing applications and smartphone data during the COVID-19 crisis have progressively increased. Carroll believes that it all comes back to the lack of existing legislation, regulations and other legal protections to protect consumers’ and citizens’ data privacy. In May, Apple and Google made updates to their respective operating systems to allow for Bluetooth-powered contact tracing applications to run on their smartphone devices. According to Carroll, both the operating systems and the applications have been built in a privacy-driven fashion; users are unable to detect the identities of others through their devices, and Apple has recently announced that this feature will be disbanded once the pandemic is no longer a major crisis. In theory, this decentralized approach is supposed to protect consumer healthcare data. However, as Carroll was quick to point out, these companies have not been perfect in the execution of their privacy-focused projects, and the mistakes they make along the way are merely chalked up as public relations problems, rather than legal ones. “This is why journalists have to play this outside role, because we don’t have laws and regulators that normally take care of this stuff,” said Carroll. Does It Work? The Cambridge Analytica scandal made major headlines, and confirmed the fears of millions of consumers around the world. It made one thing very clear: social media data in the United Safe is not safely protected. When it comes to the effectiveness of Cambridge Analytica’s data-fueled campaigns, the results are a little less definitive, according to Carroll. He prefaced his assessment of the advertising campaigns and their success in swaying the presidential election by quoting a famous saying by marketing pioneer John Wanamaker: “Half the money I spend on advertising is wasted. The trouble is, I don’t know which half.” For Carroll, “All technology targeting is dealing with this reality. Some of it doesn’t work.” Carroll found it particularly interesting in this context that Joe Biden, the presumptive Democratic nominee for the 2020 presidential election, won the nomination with an advertising budget that was just a fraction of Michael Bloomburg’s, who spent over $500 million in advertising for his Democratic campaign. “The question as to whether or not Cambrirdge Analytica worked is not answerable,” said Carroll. “But did Cambridge Analytica conduct mass data abuse on the American people? Yes. That we know.” Protecting Our Data It’s understandable if readers at this point are experiencing information overload There are many moving parts to this story, and the complex underlying issues associated with privacy in the age of social media and global networks. If you want to learn more about these issues, including how to better protect your data, but feel overwhelmed or don’t know where to start, Carroll has some comforting and helpful advice. “Try not to feel guilty that you have little control, or that you don’t know how to protect yourself,” he said. “There are some things you can do to protect your data, and the data literacy of security is important too. “But it is also important for ordinary citizens to realize they can ‘do democracy’ here. They can write to their state lawmakers. States are passing interesting privacy laws because the federal government isn’t. It’s a place for local politics to engage. These issues affect local communities. The Easton Library could have many resources for citizens on how to ‘do’ data security, because libraries take this very seriously.” For those interested in learning more, a follow-up interview with David Carroll will feature more advice for everyday citizens to protect their data in these unprecedented times. Courier readers may also view the video below of David Carroll’s public lecture delivered at Sacred heart University on February 13, 2020 ..
Recommended publications
  • BIG DATA and the FUTURE of DEMOCRACY (The Matrix World Behind the Brexit and the US Elections)
    BIG DATA AND THE FUTURE OF DEMOCRACY (The Matrix world behind the Brexit and the US Elections) Hannes Grassegger and Mikael Krogerus (Investigative journalists attached to the Swiss-based Das Magazin specialized journal. The original text appeared in the late December edition under the title: “I only showed that the bomb exists” (Ich habe nur gezeigt, dass es die Bombe gibt). This, English translation, is based on the subsequent January version, first published by the Motherboard magazine (titled: The Data That Turned the World Upside Down). Approved, present is the advanced version of the original Zurich text for the MD. Additional research for this report was provided by Paul-Olivier Dehaye). Copyright: Research Institute for European and American Studies (www.rieas.gr) Publication date: 12 February 2017. Note: The article reflects the opinion of the author and not necessarily the views of the Research Institute for European and American Studies (RIEAS). “Aegean theater of the Antique Greece was the place of astonishing revelations and intellectual excellence – a remarkable density and proximity, not surpassed up to our age. All we know about science, philosophy, sports, arts, culture and entertainment, stars and earth has been postulated, explored and examined then and there. Simply, it was a time and place of triumph of human consciousness, pure reasoning and sparkling thought. However, neither Euclid, Anaximander, Heraclites, Hippocrates (both of Chios, and of Cos), Socrates, Archimedes, Ptolemy, Democritus, Plato, Pythagoras, Diogenes, Aristotle, Empedocles, Conon, Eratosthenes nor any of dozens of other brilliant ancient Greek minds did ever refer by a word, by a single sentence to something which was their everyday life, something they saw literally on every corner along their entire lives.
    [Show full text]
  • Leadership Letter for Global MIL
    Consortium for Media Literacy Volume No. 115 Quarter 1, 2020 Leadership Letter for Global MIL The World According to Data: Taking a Look behind 02 the Marketing Machines Today, marketers know intimate details about consumers. If marketing companies are using heuristics – or patterns of behavior – to sell products and services, we need to provide everyone with heuristics, or habits of mind, to filter the media messages and be better equipped to decide for ourselves. Research Highlights 03 CML is pleased to introduce two outstanding national leaders in the data protection movement: Brittany Kaiser, co-founder of the OwnYourData Foundation and primary subject of the documentary The Great Hack, and Alistair Mactaggart, chair of Californians for Consumer Privacy, which is a force behind the California Consumer Privacy Act (CCPA). CML News 14 CML bids Charlie Firestone, head of the Communications and Society Program at the Aspen Institute, congratulations upon his retirement. Media Literacy Resources 15 Brittany Kaiser’s work is featured in Targeted, a book she authored, and in the Great Hack, a documentary available through Netflix. Med!aLit Moments 16 Sleeping Giant Middle School in Livinston, Montana, was treated to a scavenger hunt that focused on media literacy. CONNECT!ONS / Med!aLit Moments • Quarter 1, 2020 • 1 The World According to Data: Taking a Look behind the Marketing Machines The voice accorded to everyday citizens, and the data that having such voice through social media and through websites yields have upended the advertising, public relations and marketing fields. Today, marketers know intimate details about consumers – details garnered through location tracking, DNA testing, health records, and Tik Tok, among others.
    [Show full text]
  • Information Warfare, International Law, and the Changing Battlefield
    ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? .............................
    [Show full text]
  • In the Court of Chancery of the State of Delaware Karen Sbriglio, Firemen’S ) Retirement System of St
    EFiled: Aug 06 2021 03:34PM EDT Transaction ID 66784692 Case No. 2018-0307-JRS IN THE COURT OF CHANCERY OF THE STATE OF DELAWARE KAREN SBRIGLIO, FIREMEN’S ) RETIREMENT SYSTEM OF ST. ) LOUIS, CALIFORNIA STATE ) TEACHERS’ RETIREMENT SYSTEM, ) CONSTRUCTION AND GENERAL ) BUILDING LABORERS’ LOCAL NO. ) 79 GENERAL FUND, CITY OF ) BIRMINGHAM RETIREMENT AND ) RELIEF SYSTEM, and LIDIA LEVY, derivatively on behalf of Nominal ) C.A. No. 2018-0307-JRS Defendant FACEBOOK, INC., ) ) Plaintiffs, ) PUBLIC INSPECTION VERSION ) FILED AUGUST 6, 2021 v. ) ) MARK ZUCKERBERG, SHERYL SANDBERG, PEGGY ALFORD, ) ) MARC ANDREESSEN, KENNETH CHENAULT, PETER THIEL, JEFFREY ) ZIENTS, ERSKINE BOWLES, SUSAN ) DESMOND-HELLMANN, REED ) HASTINGS, JAN KOUM, ) KONSTANTINOS PAPAMILTIADIS, ) DAVID FISCHER, MICHAEL ) SCHROEPFER, and DAVID WEHNER ) ) Defendants, ) -and- ) ) FACEBOOK, INC., ) ) Nominal Defendant. ) SECOND AMENDED VERIFIED STOCKHOLDER DERIVATIVE COMPLAINT TABLE OF CONTENTS Page(s) I. SUMMARY OF THE ACTION...................................................................... 5 II. JURISDICTION AND VENUE ....................................................................19 III. PARTIES .......................................................................................................20 A. Plaintiffs ..............................................................................................20 B. Director Defendants ............................................................................26 C. Officer Defendants ..............................................................................28
    [Show full text]
  • The Great Hack - Netflix Documentary Review
    The Great Hack - Netflix documentary review The Great Hack is a documentary discussing the ideas of how data and user actions on devices can create individual profiles of you and how companies can use these profiles and personality traits based on a user actions to target you on advertisements that are specifically for that type of character and drive persuasion. This is much more effective than randomly sending adverts to random users. The documentary focuses on a company that does this called Cambridge Analytica which is the worlds leading data driven communications company and David Carrol an associate professor who wokred on exposing this companies unethical and illegal ways of gaining access to users data and using it to drive votes for specific campaigns. Cambridge Analytica played a big part in the 2016 Presidential campaign. They spent 6 months sending surveys to users which were designed to create and find personailty profiles which were then sent back and would be targeted videos and other propaganda through media. This could be a video that would pop up on a persons recomended page on youtube which could be spreading shame to Hilary Clinton in this case and therefore drive the user to vote for Trump. Further on during the documentary, you are introduced to Carole Cadwalladr who was the investigative jounarlist for the Guardian. She investigated Cambridge Analytica and how it tied to the Brexit campaign. Other students should watch this as it gives you an incite on how big and important data can be and be used and manipulated and it one of the big reasons why actions like Brexit and Trump becoming president are in place today.
    [Show full text]
  • The Cambridge Analytica Files
    For more than a year we’ve been investigating Cambridge Analytica and its links to the Brexit Leave campaign in the UK and Team Trump in the US presidential election. Now, 28-year-old Christopher Wylie goes on the record to discuss his role in hijacking the profiles of millions of Facebook users in order to target the US electorate by Carole Cadwalladr Sun 18 Mar 2018 06:44 EDT The first time I met Christopher Wylie, he didn’t yet have pink hair. That comes later. As does his mission to rewind time. To put the genie back in the bottle. By the time I met him in person [www.theguardian.com/uk- news/video/2018/mar/17/cambridge-analytica- whistleblower-we-spent-1m-harvesting-millions-of- facebook-profiles-video], I’d already been talking to him on a daily basis for hours at a time. On the phone, he was clever, funny, bitchy, profound, intellectually ravenous, compelling. A master storyteller. A politicker. A data science nerd. Two months later, when he arrived in London from Canada, he was all those things in the flesh. And yet the flesh was impossibly young. He was 27 then (he’s 28 now), a fact that has always seemed glaringly at odds with what he has done. He may have played a pivotal role in the momentous political upheavals of 2016. At the very least, he played a From www.theguardian.com/news/2018/mar/17/data-war-whistleblower-christopher-wylie-faceook-nix-bannon- trump 1 20 March 2018 consequential role. At 24, he came up with an idea that led to the foundation of a company called Cambridge Analytica, a data analytics firm that went on to claim a major role in the Leave campaign for Britain’s EU membership referendum, and later became a key figure in digital operations during Donald Trump’s election [www.theguardian.com/us-news/2016/nov/09/how- did-donald-trump-win-analysis] campaign.
    [Show full text]
  • A Duty Ethics Analysis on the Facebook–Cambridge Analytica Scandal
    A Duty Ethics Analysis on the Facebook–Cambridge Analytica Scandal STS Research Paper Presented to the Faculty of the School of Engineering and Applied Science University of Virginia By Christopher Truong March 1, 2020 On my honor as a University student, I have neither given nor received unauthorized aid on this assignment as defined by the Honor Guidelines for Thesis-Related Assignments. Signed: _______________________________________________ Approved: _______________________________________ Date ________________________ Benjamin J. Laugelli, Assistant Professor, Department of Engineering and Society 1 Introduction In early 2018, a whistleblower revealed that the British political consulting firm had harvested personal data from millions Facebook profiles and was using the data to microtarget political advertisements during election cycles in various countries, most notably in the United States, where it assisted with Senator Ted Cruz’s 2016 presidential election campaign and later Donald Trump’s campaign. While the efficacy of these microtargeted ads is debatable -- one could argue that they did not have an appreciable effect on the results of the election, they play into the much larger problem of election interference in the 21st century, where new technology developments have changed the game in how social and political interactions happen. Much of the literature on the topic focuses on the legal and political consequences of what transpired in the time period between when Cambridge Analytica began its operations and when it was whistleblown and subsequently scrutinized. There is little literature on the morality of the actions of the key players in the operation, such as the developer of the app and the CEO of Cambridge Analytica, who was presumably making the decisions of the company.
    [Show full text]
  • The Great Hack Teacher's Notes B1
    The Great Hack Teacher’s Notes B1 Shine Bright 1re File 13 Digital democracy Objectifs AXE DU PROGRAMME : Citoyenneté et mondes virtuels / Espace privé et espace public OBJECTIFS LINGUISTIQUES : Grammaire : hypothétiques, auxilaires de modalité, expression du but, causatives Lexique : internet, les réseaux sociaux. OBJECTIFS PRAGMATIQUES : expression en continu OBJECTIFS CULTURELS : le scandale Facebook/Analytica OBJECTIF METHODOLOGIQUE : émettre des hypothèses, donner son avis personnel, comprendre un texte ironique Présentation du document INFORMATIONS SUR LE DOCUMENT Le File 13 “Digital democracy” interroge la Great Hack réalisé par Karim Amer and Jehane façon dont internet s’invite dans l’exercice Noujaim et disponible sur Netflix depuis le / de la démocratie aux États-Unis. La page mois de juillet 2019. Ce film est une enquête “Online threats to democracy” aborde au cœur du “data crime” et des ramifications notamment le fait que les réseaux sociaux du scandale Facebook-Cambridge Analytica. peuvent représenter un danger pour leurs C’est bien de l’érosion de la démocratie utilisateurs, en présentant le scandale dont il est question ici à travers l’analyse de autour de l’utilisation de data de comptes l’exploitation de données personnelles à des Facebook par Cambridge Analytica pour fins politiques. tenter d’influencer des électeurs en 2016 lors Le document sélectionné ici est l’adaptation des élections présidentielles américaines et d’une interview des deux réalisateurs qui le referendum sur le Brexit. C’est ce même évoquent les raisons du choix de ce scandale thème qui est repris dans le documentaire The pour explorer le rôle politique d’internet. www.speakeasy-news.com - August 2019 B1 The Great Hack Teacher’s Notes 1 PISTES D’EXPLOITATION 1.
    [Show full text]
  • Ilnitnt ~Tares ~Cnetc JEFF FLAKE
    CHARLES E. GRASSLEY, IOWA, CHAIRMAN ORRIN G. HATCH, UTAH DIANNE FEINSTEIN. CALIFORNIA LINDSEY O GRAHAM, SOUTH CAROLINA PATRICK J LEAHY. VERMONT JOHN CORNYN, TEXAS RICHARD J DURBIN, ILLINOIS MICHAELS. LEE, UTAH SHELDON WHITEHOUSE, RHODE ISLAND TED CRUZ, TEXAS AMY KLOBUCHAR, MINNESOTA BEN SASSE. NEBRASKA CHRISTOPHER A . COONS, DELAWARE ilnitnt ~tares ~cnetc JEFF FLAKE. ARIZONA RICHARD BLUMENTHAL, CONNECTICUT MIKE CRAPO, IDAHO MAZIE K. HIRONO. HAWAII COMMITIEE ON THE JUDICIARY THOM TILLIS, NORTH CAROLINA CORY A. BOOKER, NEW JERSEY JOHN KENNEDY. LOUISIANA KAMALA D. HARRIS, CALIFORNIA WASHINGTON, DC 20510-6275 KoLAN L DAVIS, Ch,ef Counsel and Staff O,rector JENNIFER DUCK, Oemocrat,c Chief Counsel and Staff Director January 25, 2018 Mr. Stephen Bannon c/o William Burck Quinn Emanuel Urquhart & Sullivan, LLP 777 6th Street NW, I Ith floor Washington, D.C. 20001 Dear Mr. Bannon: As chief executive of the Trump campaign, a senior aide to the transition team, and former White House chief strategist, we believe that you have information that would assist the Committee in its investigation related to Russian interference in the 2016 presidential election and the dismissal of Director Corney. Accordingly, we are writing to request documents and schedule an interview with you in February 2018. Your positions placed you at key events of interest to the Committee in its investigation of Russian interference in the 2016 election and possible obstruction ofjustice . For example, it has been reported that you were involved in the Trump campaign's decision to hire Cambridge Analytica, 1 and were aware of WikiLeaks communications during the campaign with Donald Trump, Jr.
    [Show full text]
  • Cyberspace During a Crisis in Trust
    Governing Cyberspace during a Crisis in Trust An essay series on the economic potential — and vulnerability — of transformative technologies and cyber security Contents Governing Cyberspace during a Crisis in Trust . 4 Aaron Shull Tackling Cyber-enabled Crime Will Require Public-Private Leadership . 9 Neil Desai Election Cyber Security Challenges for Canada . 16 Elizabeth F. Judge and Michael Pal State and Surveillance . 21 David Lyon Trust and Data . 26 Paul Vallée Beware Fake News . 31 Eric Jardine The Need for a National Digital Identity Infrastructure . 36 Andre Boysen The Emerging Internet of Things . 41 Christopher S. Yoo The Cyber Security Battlefield . 45 Robert Fay and Wallace Trenholm TLD Operator Perspective on the Changing Cyber Security Landscape . 49 Byron Holland Strategic Stability, Cyber Operations and International Security . 55 David Mussington The Quantum Threat to Cyber Security . 60 Michele Mosca and Bill Munson Mitigating Cyber Risk across the Financial Sector . 64 Christian Leuprecht The Danger of Critical Infrastructure Interdependency . 69 Tyson Macaulay Programmable Trust . 74 Michael Mason and Matthew Spoke Patching Our Digital Future Is Unsustainable and Dangerous . 80 Melissa Hathaway Canada and Cyber Governance . 91 Stephanie Carvin Watch videos with series authors at cigionline.org/cyberspace Credits Executive Digital Media President Web Developer Rohinton P. Medhora Rebecca Anderson Interim Manager, Strategic Graphic Designer Initiatives and Special Projects Sami Chouhdary Liliana Araujo Multimedia Producer
    [Show full text]
  • Hacking the Electorate
    Hacking the Electorate On the Use of Personal Data in Political Campaigning www.kas.de Legal notice Publisher: Konrad-Adenauer-Stiftung e. V. 2020, Berlin Cover photo: © iStock/Orbon Alija Chapter marker: p. 10 © Adobe Stock/Gorodenkoff; p. 28 © Adobe Stock/Alexander; p. 38 © Shutterstock/mrmohock Design and typesetting: yellow too, Pasiek Horntrich GbR The print edition of this publication was printed by copy print Kopie & Druck GmbH, Berlin. Printed in Germany. Produced with financial support from the Federal Republic of Germany. The text of this publication is licensed under the terms of “Creative Commons Attribution-ShareAlike 4.0 International”, CC BY-SA 4.0 (available at: https://creativecommons.org/licenses/by-sa/4.0/legalcode.de). ISBN 978-3-95721-772-1 Hacking the Electorate On the Use of Personal Data in Political Campaigning At a Glance › Although data-driven political campaigning is not a new phenomenon, the tools used, the amount of data accessible, and the potential capacity to influence voters represent a new and challenging scenario for the rule of law. › With the arrival of participatory and social web, Internet users can now generate data in a complex network and without any obligation to the pursuit of objectivity or journalistic standards as pillars for content creation. › People in different countries are increasingly getting informed and learning about political candidates and other political issues through social networks. › In recent years political parties and campaigners around the world have invested heavily in online advertising, demonstrating all the potential to reach more people in an efficient, targeted, and accessible way.
    [Show full text]
  • Ad Hoc Session of the United Nations Commission on Science and Technology
    Ad Hoc Session of The United Nations Commission on Science and Technology Specialized Agency Queen’s National Model United Nations 2021 1 International Tech Summit 2018 From the Secretary-General Dear Delegates, It is my privilege to welcome you to Queen’s National Model United Nations 2021! My name is Samuel Tobert, and it is my honour to serve as your Secretary-General for QNMUN 2021. Originally from Vancouver, B.C. I study Biochemistry, Political Science and Business at Queen’s University. Model UN has been an integral part of my High School and University careers, and through it, I have met some of my closest friends, made some of my fondest memories, and learned valuable skills, becoming a more engaged global citizen. I am so glad that you have chosen to join us for this year’s iteration of QNMUN, held virtually for the first time in our history. COVID-19 has brought many challenges to our community and has presented new obstacles to Model UN; however, I can confidently say that our team has been working tirelessly to deliver a high quality and engaging conference for you. If there is anything we can do to make our conference more accessible in its online format, please do not hesitate to reach out. With this year marking my 8th on the Model UN circuit, I reflect upon the many experiences that I have had in MUN. I can confidently say that Model UN is one of the most fulfilling activities I have had the privilege to participate in. It has made me a better speaker, a better problem solver and taught me so much about myself and the world we live in.
    [Show full text]