List of QIP 2019 Attendees (Public)

Total Page:16

File Type:pdf, Size:1020Kb

List of QIP 2019 Attendees (Public) List of QIP 2019 attendees Name Affiliation Aaron Ostrander U of Maryland/QuICS Aarthi Sundaram Joint Centre for Quantum Information and Computer Science Abhinav Deshpande QuICS Adam Bene Watts MIT Adam Bouland UC Berkeley Aditya Nema Tata Institute of Fundamental Research Adrian Chapman The University of Sydney Akimasa Miyake University of New Mexico CQuIC Albert Schmitz University of Colorado Boulder Aleksander Kubica Perimeter Institute Aleksander M. Kubicki Universitat de València Alessandro Luongo IRIF, Bull/ATOS Alex Buser Caltech Alex Grilo CWI and QuSoft Alexander Dalzell Caltech Alexander Lidiak Colorado School of Mines Alexander Poremba Caltech Alexandru Gheorghiu California Institute of Technology Alexis Schotte Ghent University Ali Hamed Moosavian UMD/QUICS Alireza Seif Joint Quantum Institute Altaf Carim U.S. Department of Energy Alvaro Alhambra Perimeter Institute for Theoretical Physics Anand Natarajan Caltech András Gilyén QuSoft / CWI / U. Amsterdam André Chailloux Inria de Paris Andrea Coladangelo California Institute of Technology Andrea Rocchetto University of Oxford Andreas Bärtschi Los Alamos National Laboratory Andreas Bluhm Technical University of Munich Andrew Childs University of Maryland Andrew Glaudell University of Maryland - College Park Andrew Guo University of Maryland College Park and Joint Center for Quantum Information and Computer Science Andrew Landahl Sandia National Labs / UNM Andrew Potter Honeywell | Quantum Solutions Andrew Saydjari Harvard Physics Andrew Sornborger Los Alamos National Laboratory Andris Ambainis University of Latvia 1 List of QIP 2019 attendees Name Affiliation Andy C. Y. Li Fermilab Angelo Lucia Caltech Animesh Datta University of Warwick Anirban Narayan Chowdhury Los Alamos National Laboratory Annie Wei MIT Anthony Munson Harvard University Antoine Grospellier Inria Paris Aram Harrow MIT Ariel Shlosberg University of Colorado Boulder/JILA Arik Avagyan NIST/CU Boulder Arkin Tikku Imperial College London Arpit Dua Yale University Arturo Castellanos Salinas Kyoto University Asger Kjærulff Jensen University of Copenhagen Ashley Montanaro University of Bristol Ashwin Nayak University of Waterloo Atul Singh Arora Université libre de Bruxelles Austin Daniel University of New Mexico CQuIC Avishay Tal Stanford University Ayal Green Hebrew University of Jerusalem Bailey Gu Caltech Balint Pato Google Barbara Jones IBM Research Almaden Bei Zeng University of Guelph Ben Hamlin Texas A&M University Benjamin Cordier Oregon Health & Science University Bill Fefferman University of Maryland Brad Lackey Microsoft Quantum Bradley Pearlman CU Boulder Brian Eccles IBM Bryan O'Gorman UC Berkeley Cambyse Rouze University of Cambridge Carl Miller QuICS / NIST Carlo Sparaciari Imperial College London Casey Duckering University of Chicago Casey Tomlin Booz Allen Hamilton Cécilia Lancien CNRS, Institut de Mathématiques de Toulouse Cedric Beny Hanyang University Changhao Yi University of New Mexico CQuIC 2 List of QIP 2019 attendees Name Affiliation Charles Baldwin Honeywell Quantum Solutions Charles Derby University College London Charles Stewart Hadfield Rigetti Computing Chenyang Li University of Toronto Ching-Yi Lai Institute of Communications Engineering, National Chiao Tung University Chinmay Nirkhe UC Berkeley Chris Cade University of Bristol Chris Langer Honeywell Christa Zoufal IBM Research Zurich/ ETH Zurich Christian Majenz QuSoft, University of Amsterdam Christophe Vuillot QuTech, TU Delft Christopher Chubb University of Sydney Chuhan Lu Portland State University Chunhao Wang University of Texas at Austin Ciaran Ryan-Anderson Swansea University Cihan Okay University of British Columbia Connor Paddock Waterloo/IQC Craig Gidney Google Inc - Santa Barbara Cupjin Huang CSE Dan Underwood Riverlane Daniel Gottesman Perimeter Institute Daniel Grier MIT Daniel Litinski Free University of Berlin Daniel Murphy Georgia Tech Daniel Nagaj Institute of Physics, Slovak Academy of Sciences Daniel Stilck Franca University of Copenhagen Dave Chapman Gold Mountain Technology David Cohen Center for Computing Sciences David Collins Colorado Mesa University David Gosset University of Waterloo David Hayes Honeywell Quantum Solutions David Jennings The University of Leeds David Lyons Lebanon Valley College David Mestel University of Luxembourg Davide Orsucci University of Innsbruck Dawei Ding Stanford University Dax Enshan Koh Massachusetts Institute of Technology Dominic Berry Macquarie University 3 List of QIP 2019 attendees Name Affiliation Dominic Verdon University of Bristol Dominik Hangleiter FU Berlin Donghun Ha Hanyang University DongPing Zhang Advanced Micro Devices inc Dorit Aharonov Hebrew University of Jerusalem Dripto Debroy Duke University Earl Campbell University of Sheffield Eddie Schoute QuICS Edgar Solomonik University of Illinois at Urbana-Champaign Eleanor Rieffel NASA Ames Research Center Elizabeth Behrman Wichita State University Elizabeth Crosson University of New Mexico Emil Khabiboulline Harvard University Eneet Kaur Louisiana State University Eric Anschuetz Massachussetts Institute of Technology Eric Bylaska PNNL Eric Chitambar University of Illinois at Urbana-Champaign Erik Nielsen Sandia National Laboratories Eugene Dumitrescu ORNL Eunok Bae Kyung Hee University Eunou Lee Penn State University Evan Anderson Former CU Boulder Student Evgeny Mozgunov University of Southern California Eyuri Wakakuwa University of Electro-Communications Ezad Shojaee University of New Mexico CQuIC Fabian Portner University of Cologne Fabio Joel Auccapuclla Quispe Pontificia Universidad Catolica del Peru / Student Fang Song Texas A&M U Felix Leditzky JILA, University of Colorado Boulder Frances Hubis ETH Zurich Francois Le Gall Kyoto University Fred Shultz Wellesley College Frederic Magniez IRIF / CNRS Ge Bai University of Hong Kong Geoff Penington Stanford Gian Giacomo Guerreschi Intel Gilad Gour University of Calgary Gopikrishnan Muraleedharan University of New Mexico CQuIC Gorjan Alagic University of Maryland 4 List of QIP 2019 attendees Name Affiliation Graeme Smith JILA / CU Boulder Grant Salton Caltech IQIM Greg Kuperberg University of California, Davis Guang Hao Low Microsoft Guanyu Zhu Joint Quantum Institute, University of Maryland Han-Hsuan Lin Department of Computer Science - The University of Texas at Austin Hani Ebeid The Johns Hopkins University Applied Physics Laboratory Hao-Chung Cheng University of Cambridge Hargeet Kaur Indian Institute of Technology Jodhpur Hayata Yamasaki The University of Tokyo Hector Bombin PsiQuantum Helia Kamal University of California, Berkeley Henry Yuen University of Toronto Hilma Vasconcelos NIST - Boulder / Universidade Federal do Ceara Himanshu Thapliyal University of Kentucky Ho-Joon Kim Kyung Hee University Honghao Fu University of Maryland, College Park Howard Barnum No current affiliation Hsin-Yuan Huang California Institute of Technology Iman Marvian Duke University Ingo Roth Freie Universität Berlin InU Jeon Seoul National University, Center for Macroscopic Quantum Control Ir. Arjan Cornelissen CWI Isaac Kim Stanford University Jack Hidary X The Moonshot Factory Jacob Bringewatt University of Maryland/JQI/QuICS Jaimie Stephens Sandia National Laboritories James Seddon University College London James Watson University College London James Weaver IBM Jamie Sikora Perimeter Institute Jarrett Smalley University of New Mexico JD Dulny Booz Allen Hamilton Jeffrey Cohn Georgetown University / IBM Almaden Research Jeong San Kim Kyung Hee University Jeremie Roland ULB - QuIC Jerome Jenquin NSA Jessica Chang DOD 5 List of QIP 2019 attendees Name Affiliation Jianqiang Li Pennsylvania state university Jiayu Zhang Boston University Jibran Rashid Institute of Business Administration Jim Beckman unaffiliated Jim van Meter NIST Jin-Peng Liu University of Maryland João Fernando Doriguello University of Bristol Joel Klassen QuTech Johannes Bausch University of Cambridge John Cortese Massachusetts Institute of Technology John Napp MIT John Preskill Caltech John Smolin IBM Research Jon Allcock Tencent Jon Tyson - Jonas Anderson Northrop Grumman Jonathan Baker University of Chicago Jonathan Gross Université de Sherbrooke Joran van Apeldoorn CWI Jordan Cotler Stanford University Joseph Fitzsimons Centre for Quantum Technologies Joseph Iverson IQIM (California Institute of Technology) Joseph Renes ETH Zurich Josh Combes Rigetti Joshua Levin CU Boulder/JILA Justin Yirka Unaffiliated Kabgyun Jeong Seoul National University Kai DeLorenzo Middlebury College Kaifeng Bu Harvard University Kaixin Huang University of Maryland, College Park Kamil Korzekwa The University of Sydney Kanae Nakabayashi Yamagata University Kanav Setia Dartmouth College Karl Mayer University of Colorado Boulder Kathleen Hamilton Oak Ridge National Laboratory Kaushik Seshadreesan University of Arizona Keisuke Fujii Kyoto University Kevin Obenland MIT/Lincoln Laboratory Kevin Sung Google 6 List of QIP 2019 attendees Name Affiliation Kianna Wan Stanford University Kiichiro DeLuca WERU Investment Kimika Beppu Yamagata University Kohtaro Kato California Institute of Technology Kosuke Fukui Kyoto University Kosuke Mitarai Osaka University Kristen Pudenz Lockheed Martin Kun Fang DAMTP, University of Cambridge Kunal Sharma Louisiana State University Kushagra Pundeer University of Massachusetts, Amherst Kyle Kinneberg NSA Kyungjoo Noh Yale University Lana Mineh University of Bristol Laura Clinton University College London Leo Zhou Harvard University Leonard Wossnig University College London Leonid Pryadko
Recommended publications
  • Law Enforcement Agencies Embrace the Social Media Lifestyle
    Law Enforcement Agencies Embrace the Social Media Lifestyle Todd R. English Abstract The purpose of this research paper was to determine if Florida Sheriff’s Offices have embraced the use of social media as a way to interact with their communities. All sixty-seven (67) counties in Florida were surveyed. The data illustrates the frequency of agencies using social media and whether social media use for community outreach has been successful. This paper also offers insight into the progressive world of social media and makes suggestions for how law enforcement agencies can become involved in social media and use it to improve their relationship with the public. Introduction The advancement of social media and its effects on the daily routines of our society is evolving daily. Many people have chosen to live their lives glued intently to the updates and information received from social media. We now see that people of all ages and organizations of all types are using social media like never before. The International Association of Chiefs of Police defines social media as “a category of Internet-based resources that integrate user-generated content and user participation” (IACP National Law Enforcement Policy Center, 2010, p.1). Experian Marketing Services in their 2013 Digital Marketer Report defines social media as including everything from photo and video sharing sites to social and professional networks, to online forums and more. In a typical month, three-quarters of all online adults (76 percent) say they have visited a social networking site like Facebook or Twitter, and 70 percent visited photo or video sharing sites like Flickr and YouTube (Experian Marketing Services, 2013).
    [Show full text]
  • Violent Radicalization Jamie Bartlett a & Carl Miller a a Violence and Extremism Programme , Demos, London, UK Published Online: 06 Dec 2011
    This article was downloaded by: [UVA Universiteitsbibliotheek SZ] On: 16 March 2015, At: 07:25 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Terrorism and Political Violence Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/ftpv20 The Edge of Violence: Towards Telling the Difference Between Violent and Non- Violent Radicalization Jamie Bartlett a & Carl Miller a a Violence and Extremism Programme , Demos, London, UK Published online: 06 Dec 2011. To cite this article: Jamie Bartlett & Carl Miller (2012) The Edge of Violence: Towards Telling the Difference Between Violent and Non-Violent Radicalization, Terrorism and Political Violence, 24:1, 1-21, DOI: 10.1080/09546553.2011.594923 To link to this article: http://dx.doi.org/10.1080/09546553.2011.594923 PLEASE SCROLL DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.
    [Show full text]
  • News Sharing on UK Social Media: Misinformation, Disinformation, And
    O3C 1 NEWS SHARING ON UK SOCIAL MEDIA MISINFORMATION, DISINFORMATION, AND CORRECTION SURVEY REPORT ANDREW CHADWICK & CRISTIAN VACCARI O3C 1 / News Sharing on UK Social Media Contents About the Authors 3 About this Report 4 Summary of Key Findings 5 1. Introduction 6 2. Threats to Online Civic Culture 6 3. Sharing News on Social Media: Why It Matters for Online Civic Culture 6 3.1 People, Motivations, and Behaviour 7 3.2 Key Questions 8 4. Who Shares Political News and How Regularly? 8 5. What Motivates People to Share Political News on Social Media 11 6. Problematic News Sharing 13 6.1 Measuring Problematic News Sharing: Distinguishing Between Misinformation and Disinformation 13 6.2 The Extent of Problematic News Sharing Among British Social Media Users 14 6.3 Who Engages in Problematic News Sharing? 15 7. The Promise—and the Reality—of Online Correction 17 7.1 Who Corrects Others? 19 7.2 Who Is More Likely to be Corrected? 20 8. Conclusions 23 About the Online Civic Culture Centre (O3C) 25 Notes 26 O3C 1 / News Sharing on UK Social Media 2 About the Authors Andrew Chadwick Professor Andrew Chadwick, Professor of Political Communication and director of the Online Civic Culture at Loughborough University. [email protected] Cristian Vaccari Dr Cristian Vaccari, Reader in Political Communication at Loughborough University. [email protected] The views in this report are those of its authors. This research received no external funding. We thank Opinium Research, which provided its survey services pro bono. O3C 1 / News Sharing on UK Social Media 3 About this Report n today’s media systems, large numbers of ordinary citizens circulate political information with great regularity.
    [Show full text]
  • A Bestiary of the 9/11 Truth Movement
    SI July August 11_SI new design masters 5/25/11 12:17 PM Page 43 A Bestiary of the 9/11 Truth Movement: Notes from the Front Line Two social scientists describe their experience confronting the 9/11 Truth movement in the United Kingdom after they published a paper linking conspiracy theories with extremist ideology. They argue that the 9/11 Truth movement is composed of three groups and that each accepts the conspiracy meme for different reasons. JAMIE BARTLETT and CARL MILLER (Hardwig 1991); an ideological response “I was fifty-five years old when I began to understand the world in my view. ... I’m to structural inequalities (Fenster 1999); actually quite certain, and I don’t want to believe it . that the people we call the gov- 1 and a natural human tendency to seek ernment murder us in order to start wars that make money for them.” order in an ever more complex, confusing world (Popper [1945] 2006). Once im- n his article “The Conspiracy Meme: Why Conspiracy planted, it is incredibly difficult to shake. Theories Appeal and Persist” (SI, January/February Over the past year we have been watching and confronting one particu- I 2011), Ted Goetzel suggests conspiracy theorizing is a lar version of this meme: the 9/11 Truth meme—a way of thinking that spreads, survives, or dies ac- movement. In August 2010, we released cording to a process analogous to genetic (termed mimetic) a paper about conspiracy theories, “The Power of Unreason.” Within hours, the selection. The conspiracy meme competes with others, such online conspiricist community hit back.
    [Show full text]
  • Spin Cycle: Information Laundering on Facebook
    Spin Cycle: Information Laundering on Facebook Chloe Colliver Mackenzie Hart Eisha Maharasingam-Shah Daniel Maki About This Report Acknowledgements This report presents the findings of We would like to express our gratitude an investigation conducted by ISD to Carl Miller and Natasha Bach ahead of the US Presidential election for their helpful feedback and revisions, in November 2020. The investigation and Elise Thomas for her research analysed a series of Facebook groups support over the course of the and pages exhibiting suspicious, investigation. Any mistakes or potentially coordinated and inauthentic omissions are the authors’ own. activity. This network of groups and pages were being used to promote divisive political content to primarily US-based audiences. The findings suggest a form of information laundering may be taking place on Facebook, in which suspect content is posted by small, seemingly disparate groups and pages and then subsequently seeded into online communities composed of real Facebook users. The report speaks to one of the enduring challenges faced by technology companies, civil society organisations, researchers and policymakers: how to determine what constitutes illegitimate, deceptive behaviour on platforms such as Facebook. Beirut Berlin London Paris Washington DC Copyright © Institute for Strategic Dialogue (2020). Institute for Strategic Dialogue (ISD) is a company limited by guarantee, registered office address PO Box 75769, London, SW1P 9ER. ISD is registered in England with company registration number 06581421 and registered charity number 1141069. All Rights Reserved. www.isdglobal.org Spin Cycle: Information Laundering on Facebook 3 Executive Summary The coronavirus pandemic has driven more of our identifies potential signals that a social media entity political and electoral discussion online than ever is being deceptive or misleading, how many of these before.
    [Show full text]
  • The Role of Public Service Media in the Fight Against Disinformation
    Journalist Fellowship Paper . The role of public service media in the fight against disinformation By R ebecca Skippage December 2020 Michaelmas Term Sponsor: BBC 2 Contents Acknowledgements 4 Introduction 5 ‘An army for truth’ 6 Reaching the ‘unreached’ 8 Understanding the audience 9 An agile response 12 Creating communities, building trust 14 Break out of silos 14 Use, make local connections 14 Create a community 15 Learn from the “bad guys” 15 Review impact 16 3 Acknowledgements My thanks to Fergus Bell (Fathm), Federica Cherubini (Reuters Institute for the Study of Journalism), Dr Lucas Graves (School of Journalism + Mass Communication, University of Wisconsin), Clara Jiménez Cruz ( Maldita ), Carl Miller (Centre for the Analysis of Social Media, DEMOS), Prof Rasmus Kleis Nielsen (Professor of Political Communication + Director, RISJ), Nick Pickles (Twitter), Peter Pomerantsev (Author + Institute of Global Affairs at the LSE), Dr Craig T Robertson (RISJ), Sriram Srinivasan (T he Hindu ), Dr Claire Wardle (First Draft), Miriam Wells (B ureau of Investigative Journalism) . Particular thanks for their guidance to Meera Selva and Caithlin Mercer at the Reuters Institute, and to Judy King at B BC Monitoring for her support throughout the fellowship process. For their knowledge, tenacity and consistent good humour, my appreciation and profound admiration go to the BBC’s Anti-Disinformation Unit - particularly Alistair Coleman, Olga Robinson and Shayan Sardarizadeh. For his encouragement and steadfast support, thanks – as ever – to Paul Tierney. Finally, my glass is raised to the 2020 Michaelmas term Reuters fellows: a group of fierce, bright, kind, wonderful women who continue to uphold and champion each other.
    [Show full text]
  • Introducing Social Media Intelligence (SOCMINT) Sir David Omand, Jamie Bartlett & Carl Miller Version of Record First Published: 28 Sep 2012
    This article was downloaded by: [King's College London] On: 03 October 2012, At: 01:56 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Intelligence and National Security Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/fint20 Introducing Social Media Intelligence (SOCMINT) Sir David Omand, Jamie Bartlett & Carl Miller Version of record first published: 28 Sep 2012. To cite this article: Sir David Omand, Jamie Bartlett & Carl Miller (): Introducing Social Media Intelligence (SOCMINT), Intelligence and National Security, DOI:10.1080/02684527.2012.716965 To link to this article: http://dx.doi.org/10.1080/02684527.2012.716965 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-and- conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. Intelligence and National Security 2012, 1–23, iFirst ARTICLES Introducing Social Media Intelligence (SOCMINT) SIR DAVID OMAND,* JAMIE BARTLETT AND CARL MILLER ABSTRACT We introduce the latest member of the intelligence family.
    [Show full text]
  • How to Catch a Crook: Behind the Scenes of a Police Raid on a Cyber-Criminal’S Home
    How to catch a crook: behind the scenes of a police raid on a cyber-criminal’s home Faceless, nameless cyber-villains are notoriously hard to catch. Carl Miller joins the police on an operation that brought one blinking into the daylight — and to justice GETTY IMAGES The Sunday Times, August 19 2018, 12:01am ‘This is the third phase of Operation Field-Day,” says the police officer. A photo of the suspect is silently passed around. He’s in his thirties, but looks many years younger. “His arrest is necessary to protect vulnerable persons and property,” the officer continues, as I stare at the man in the picture. A thin beard, short downy hair, unblemished skin and, at a glance, soft, even kind, eyes. A sweltering July day was beginning to draw into dusk. I was in a building in the middle of a featureless industrial park. Neatly trimmed bushes, empty pavements, glass and brick; it could have been anywhere. But if you tapped one of the “rotting” wooden bollards that surround the building, you’d notice a difference — they are actually metal, and would probably stop a tank. 1 The front door of the building was blastproof. Inside, framed portraits — one after the other — neatly lined the wall. An Uzi sub-machinegun. A yacht. Thirty bin bags full of drugs. A fleet of Range Rovers. Photographs of goods seized from criminals. I was in a covert police headquarters. The light now fading, we pulled out of the building in a small convoy. Three unmarked police cars quietly snaked through evening traffic, past emptying parks and filling restaurants.
    [Show full text]
  • Defence Studies Is It Possible and Preferable to Negotiate With
    This article was downloaded by: [Tufts University] On: 25 June 2015, At: 11:41 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Defence Studies Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/fdef20 Is it Possible and Preferable to Negotiate with Terrorists? Carl Miller a a King’s College London Policy Institute Published online: 08 Apr 2011. To cite this article: Carl Miller (2011) Is it Possible and Preferable to Negotiate with Terrorists?, Defence Studies, 11:1, 145-185, DOI: 10.1080/14702436.2011.553109 To link to this article: http://dx.doi.org/10.1080/14702436.2011.553109 PLEASE SCROLL DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.
    [Show full text]
  • Social Media Research and Non-Proliferation
    Trust Trust October-December 2014 October-December Social media research and non-proliferation Sometimes technologies come along that completely change how we can connect to each • other: the printing press, the telegraph and the telephone; the newspaper, the radio and TV. 147 Number Issue Each changes how society, and all of us work, how we relate to each other, how we organise, who we think we are and how we live our lives. They are technologies that begin social revolutions. We are living through one such revolution now. Since the mid 1990s, the Internet has in- • & ISSN 0966–9221 creasingly crept into our daily lives. And less than a decade ago, as the Internet revolution was picking up pace, it dramatically shifted direction. Suddenly, people began to use those platforms, apps, forums and sites that allowed them not just to find and consume content, Verify but also to create and share it. This was the birth of a new, ‘social’ media–and it has trans- formed how the Internet is used today. The rise of social media has not just transformed how society works, but also how it can be studied. Throughout history, most human activity has naturally and normally been lost. As people have moved more and more of their lives—intellectual, professional, political and social—online, more and more of the normal concourse of daily existence is captured in digital form. Every minute Facebook users share 2.5 million pieces of content, Twitter users Tweet 300,000 times, YouTube users upload 72 hours of video, Apple users download 50,000 apps.
    [Show full text]
  • FANNING the FLAMES: Foreign State-Sponsored Disinformation in the Time of COVID
    FANNING THE FLAMES: Foreign State-Sponsored Disinformation in the Time of COVID MAY 2021 DISINFO CLOUD | Fanning the Flames: Foreign State-Sponsored Disinformation in the Time of COVID Authored by Rafa Bhulai, Christina Nemr, Marine Ragnet, and Eliza Thompson Acknowledgements The authors are grateful for the contributions and review of this report by Gabriel Delsol, Brendan O’Donoghue, and Andrew Rothgaber of Park Advisors, as well as the editorial assistance provided by Rhonda Shore. This report was produced with support from the U.S. Department of State’s Global Engagement Center. Any views expressed herein are those of the authors and do not necessarily refect the views of the U.S. Department of State and Park Advisors. Any errors contained in this report are the authors’ alone. DISINFO CLOUD | Fanning the Flames: Foreign State-Sponsored Disinformation in the Time of COVID 0. Table of Contents 01 Introduction 03 A Look at Foreign State-Sponsored Disinformation and Propaganda 03 More is More: Russian Infuence and Disinformation Campaigns 06 Disarm, Deny, Defect: Chinese Infuence and Disinformation Campaigns 09 Local Priorities, Some Global Forays: Iranian Infuence and Disinformation Campaigns 12 Who’s Responding and How? 12 Government-Led Responses to Disinformation 20 Social media platforms and big tech responses 27 Civil Society Responses 31 What’s the State of Technology? 36 Conclusion DISINFO CLOUD | Fanning the Flames: Foreign State-Sponsored Disinformation in the Time of COVID 1 1. Introduction In March 2019, we released a publication titled “Weapons of Mass Distraction: ForeiGn State- Sponsored Disinformation in the DiGital AGe.” That report provided an interdisciplinary review of the human and technoloGical vulnerabilities to foreiGn propaGanda and disinformation as well as an overview of several countries notable for such operations, includinG Russia and China.1 The research surveyed in that report, particularly around human and technoloGical vulnerabilities to disinformation, still holds true.
    [Show full text]
  • Development Assistance and Counterterrorism
    Development Assistance and Counterterrorism Jessica Trisko Darden SEPTEMBER 2019 AMERICAN ENTERPRISE INSTITUTE Development Assistance and Counterterrorism Jessica Trisko Darden SEPTEMBER 2019 AMERICAN ENTERPRISE INSTITUTE Cover image: A boy stands as an aid convoy of Syrian Arab Red Crescent drives through the besieged town of Douma, Eastern Ghouta, Damascus, Syria, March 5, 2018. REUTERS/Bassam Khabieh. © 2019 by the American Enterprise Institute. All rights reserved. The American Enterprise Institute (AEI) is a nonpartisan, nonprofit, 501(c)(3) educational organization and does not take institutional positions on any issues. The views expressed here are those of the author(s). Contents Executive Summary .................................................................................. 1 Introduction ............................................................................................2 I. A Civilian Counterterrorism Strategy ........................................................3 II. Refining the Development Approach to Counterterrorism ..........................8 III. Conclusion and Recommendations ...................................................... 17 Notes ................................................................................................... 19 iii Executive Summary errorism remains a persistent challenge driven Many US-funded programs have taken standard Tby ideology and unstable political and economic development projects, in areas such as girls’ educa- environments. US counterterrorism policy must draw tion
    [Show full text]