Building Resilience & Confronting Risk In

Total Page:16

File Type:pdf, Size:1020Kb

Building Resilience & Confronting Risk In BUILDING RESILIENCE & CONFRONTING RISK IN THE COVID-19 ERA A PARENTS & CAREGIVERS GUIDE TO ONLINE RADICALIZATION POLARIZATION AND EXTREMISM RESEARCH AND INNOVATION LAB (PERIL) PERIL brings the resources and expertise of the university sector to bear CONTENTS on the problem of growing youth polarization and extremist radicalization, through scalable research, intervention, and public education ideas to PARENT & CAREGIVER GUIDE 3 reduce rising polarization and hate. WHAT IS ONLINE RADICALIZATION? WHY SHOULD YOU CARE? 4 SOUTHERN POVERTY LAW CENTER NEW RISKS IN THE COVID-19 ERA 5 The SPLC seeks to be a catalyst for racial justice in the South and RECOGNIZING WARNING SIGNS 6 beyond, working in partnership with communities to dismantle white UNDERSTANDING THE DRIVERS 7 supremacy, strengthen intersectional movements, and advance the ENGAGE AND EMPOWER 9 human rights of all people. RESPONDING TO HATE 11 HOW TO GET HELP 12 APPENDIX: STAYING ALERT TO SITES, PLATFORMS AND APPS FREQUENTLY EXPLOITED BY EXTREMISTS 17 ENDNOTES 19 CREDITS 20 ILLUSTRATIONS BY CLAUDIA WHITAKER PARENT & CAREGIVER GUIDE Who is this guide for? We wrote this guide with a wide Whether you live with a young person, or work virtually range of caregivers in mind. with youth, radicalization to extremism is something we all should be concerned about. Extremists looking Caregivers living with children and young adults. This to recruit and convert children are predatory. Like all includes parents, grandparents, foster parents, extended forms of child exploitation, extremist recruitment drives families, and residential counselors who are the a wedge between young people and the adults they would guardians and caregivers of children and youth living typically trust. The radicalization of young people is a at home, in group homes, and other residential settings. threat to civil society, from the innocent people it vic- In the wake of the global pandemic, adults in the home timizes to the family bonds it breaks apart. Whether you live with a young have taken on new responsibilities for homeschooling and are now often the only adults youth interact with on In addition to the anxieties of the COVID-19 era, on-go- person, or now work virtually with a daily basis. They are on the front lines of recognizing ing Black Lives Matter protests against the legacy of and responding to radicalization in the COVID-19 era. police brutality and systemic racism, as well as intense youth, radicalization to extremism polarization around the 2020 presidential election are Caregivers outside the home. This includes teachers, being exploited by far right extremists. These protests is something we all should be principals, school counselors, coaches, music teachers, affirm the need to end and to dismantle white suprem- religious and youth group leaders, scout troop leaders, acy as an essential step to preventing extremist radical- employers, social workers, mental health therapists and ization. Extremists are seeking to co-opt these protests in concerned about. Extremists looking other adults who continue to engage with youth, even in ways that heighten the risks of violence and online rad- virtual settings. These adults--who normally form a dense icalization. This guide will help families, caregivers, and to recruit and convert children are network of trusted adults that interact with young people youth recognize and confront new risks posed by far-right on a daily basis--still have regular contact with them in extremists during this time. It will also help you build predators. Like all forms of child online contexts and in-person outside the home in some resilience against these risks well beyond this moment. unique cases. These caregivers are well-placed to recog- exploitation, extremist recruitment nize warning signs of radicalization. Adults outside the home are also a key network for in-home caregivers and drives a wedge between young parents to connect with as a resource and sounding board people and the adults they would during the pandemic. normally trust. Radicalization is a problem for our entire society, from This project was made possible the innocent people it victimizes to by a generous contribution from the family bonds it breaks apart. The Piper Fund. 2 A PARENTS AND CAREGIVERS GUIDE TO ONLINE RADICALIZATION PERIL & SOUTHERN POVERTY LAW CENTER WWW.SPLCENTER.ORG/PERIL 3 WHAT IS ONLINE RADICALIZATION? NEW RISKS IN THE COVID-19 ERA nline radicalization was a concern well before the COVID-19 pandemic began.4 But the pandemic itself has increased WHY SHOULD YOU CARE? O the risks of online radicalization at the same time as it has heightened the vulnerabilities and drivers that make nline radicalization occurs when someone’s online activities—reading, watching videos, or socializing— help youth susceptible to extremist narratives and predatory recruiters. Here are some reasons why: O lead them to adopt politically or religiously extremist views. Extremist beliefs say that one group of people is in dire conflict with other groups who don’t share the same ethnic, religious or political identity. Extremists Unprecedented time online. Almost 93% of people in States will be touched by the loss of life from COVID-19. believe that this imagined conflict can only be resolved through separation, domination, or violence between households with school-age children reported their chil- Young people have also lost their regular network of peer groups. This frequently leads to anti-democratic opinions and goals, such as a desire for dictatorship, civil war, dren had engaged in some form of distance learning since support, the rewards and milestones of the school year or an end to the rule of law.1 the outbreak of COVID-19. Nearly 15 million college stu- (sports, dances, graduation, etc.), and their daily rou- dents have switched to online learning as well. For mil- tine and structure. COVID-19’s impact on the economy “Radicalization” simply means any process that leads a person to hold extremist beliefs. These beliefs may or may lions of youth, the hours previously spent at school or in is pushing caregivers into unemployment, promising not lead to overt violence. Just like there are many forms of extremism, there is no single pathway to radicaliza- classrooms under the supervision of trusted adults are an ongoing loss of financial stability for all who depend tion. It is a complex process, involving many personal and external influences. Finally, it is important to note that now largely spent online. on them. Financial instability, uncertainty and loss not all ‘radical’ politics are extremist. Beliefs that challenge established systems of political power are sometimes are also contributing to an increase in adverse mental unfairly labeled this way in order to discredit them. Remember: for someone’s political views to be a matter of seri- Distracted parents and caregivers. Work has not stopped health conditions for both young ous concern, they should match the definition of extremism provided above. Here are some of the most common for most parents and caregivers. Some adults must people and adults.6 ways people radicalize online: work online during much or most of the day. Many other adults must continue to go to work outside the home, Scapegoating and simplistic Content “Rabbit Holes.” People can radicalize by reading Peer Sharing. Sometimes, people are shown extremist leaving children’s online activities answers. Extremist groups exploit or viewing increasingly extreme texts, videos, memes or content and propaganda by peers and online acquain- unsupervised. Parents and care- tragedy and loss by pushing blame other content online. Gradual encounters with more and tances. Often, such content is treated as a dark joke, or givers are relaxing screen time onto scapegoats who they claim more extreme content—sometimes through automatic “edgy” humor expressed through a playful meme or ani- restrictions in order to find more are responsible for the virus and recommendations that suggest other videos to watch, mated video. But research shows that exposure like this time for their own work, both in its broader impacts. Such groups books to purchase or articles to read—can open pathways can lead some people to consider extremist positions, pre- and outside the home. thrive during times of uncertainty to radicalization for at-risk people. Healthy skepticism of paring them for later radicalization.3 Jokes, like memes by offering simplistic answers and government can develop into views that promote socie- about the Holocaust or slavery, also help to dehumanize Risks associated with easy targets to blame. tal breakdown or violent conflict with democratic insti- entire groups of people, making it easier to rationalize at-home digital learning. tutions. For example, an interest in conspiracy theories violent action in the future. Significant increases in time Broadening support base. Some extremist might lead to antisemitic world views. spent online increase the likeli- groups are exploiting COVID-19 as a pub- Direct contact with extremists online. In the past, hood of encounters with bad actors. lic relations opportunity, engaging in com- Filter Bubbles. Online radicalization is helped by a lack extremists were limited in their chances to speak directly This is the case with child exploitation, according to munity service aimed at softening their of competing views or challenges to the ideologies peo- with young people. But the internet connects extremists an FBI warning issued in April 2020,5 and it is also
Recommended publications
  • Download Download
    Proceedings of the Fifteenth International AAAI Conference on Web and Social Media (ICWSM 2021) A Large Open Dataset from the Parler Social Network Max Aliapoulios1, Emmi Bevensee2, Jeremy Blackburn3, Barry Bradlyn4, Emiliano De Cristofaro5, Gianluca Stringhini6, Savvas Zannettou7 1New York University, 2SMAT, 3Binghamton University, 4University of Illinois at Urbana-Champaign, 5University College London, 6Boston University, 7Max Planck Institute for Informatics [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract feasible in technical terms to create a new social media plat- Parler is as an “alternative” social network promoting itself form, but marketing the platform towards specific polarized as a service that allows to “speak freely and express yourself communities is an extremely successful strategy to bootstrap openly, without fear of being deplatformed for your views.” a user base. In other words, there is a subset of users on Twit- Because of this promise, the platform become popular among ter, Facebook, Reddit, etc., that will happily migrate to a new users who were suspended on mainstream social networks platform, especially if it advertises moderation policies that for violating their terms of service, as well as those fearing do not restrict the growth and spread of political polariza- censorship. In particular, the service was endorsed by several tion, conspiracy theories, extremist ideology, hateful and vi- conservative public figures, encouraging people to migrate olent speech, and mis- and dis-information. from traditional social networks. After the storming of the US Capitol on January 6, 2021, Parler has been progressively de- Parler.
    [Show full text]
  • Riots: a Comparative Study of Twitter and Parler
    111 Capitol (Pat)riots: A comparative study of Twitter and Parler HITKUL, IIIT - Delhi, India AVINASH PRABHU∗, DIPANWITA GUHATHAKURTA∗, JIVITESH JAIN∗, MALLIKA SUBRA- MANIAN∗, MANVITH REDDY∗, SHRADHA SEHGAL∗, and TANVI KARANDIKAR∗, IIIT - Hy- derabad, India AMOGH GULATI∗ and UDIT ARORA∗, IIIT - Delhi, India RAJIV RATN SHAH, IIIT - Delhi, India PONNURANGAM KUMARAGURU, IIIT - Delhi, India On 6 January 2021, a mob of right-wing conservatives stormed the USA Capitol Hill interrupting the session of congress certifying 2020 Presidential election results. Immediately after the start of the event, posts related to the riots started to trend on social media. A social media platform which stood out was a free speech endorsing social media platform Parler; it is being claimed as the platform on which the riots were planned and talked about. Our report presents a contrast between the trending content on Parler and Twitter around the time of riots. We collected data from both platforms based on the trending hashtags and draw comparisons based on what are the topics being talked about, who are the people active on the platforms and how organic is the content generated on the two platforms. While the content trending on Twitter had strong resentments towards the event and called for action against rioters and inciters, Parler content had a strong conservative narrative echoing the ideas of voter fraud similar to the attacking mob. We also find a disproportionately high manipulation of traffic on Parler when compared to Twitter. Additional Key Words and Phrases: Social Computing, Data Mining, Social Media Analysis, Capitol Riots, Parler, Twitter 1 INTRODUCTION Misinformation of the United States of America’s presidential election results being fraudulent has been spreading across the world since the elections in November 2020.1 Public protests and legal cases were taking place across the states against the allegation of voter fraud and manhandling of mail-in ballots.2 This movement took a violent height when a mob attacked the Capitol Hill building to stop certification of Mr.
    [Show full text]
  • Gamers Who Hate: an Introduction to ISD's Gaming and Extremism Series
    Gaming and Extremism Gamers Who Hate: An Introduction to ISD’s Gaming and Extremism Series Jacob Davey About the series This briefing is the first in ISD’s Gaming and Extremism Series exploring the role online gaming plays in the strategy of far-right extremists in the UK and globally. This is part of a broader programme on the ‘Future of Extremism’ being delivered by ISD in the second half of 2021, charting the transformational shifts in the extremist threat landscape two decades on from 9/11, and the policy strategies required to counter the next generation of extremist threats. This briefing provides an introduction to the series and presents the key findings that ISD analysts found in an exploratory study into extremist activity on four gaming-related platforms, Steam, Discord, DLive and Twitch. Gaming and Extremism Contents 3 Contents Introduction 4 Key Findings 6 Methodology 10 Endnotes 11 Gaming and Extremism Gamers Who Hate 4 Introduction Globally, gaming is now the most profitable To help fill this crucial evidence gap ISD engaged in a entertainment industry, far surpassing both music scoping project exploring the use of the gaming-related and film.1 According to the gaming market data platforms Steam, Discord, Twitch and DLive by the company Newzoo, there are 2.81 billion gamers extreme right, concentrating specifically on the UK. worldwide2 and in the United Kingdom 39% of the This work is presented in our Gaming and Extremism population play video games, a figure that rises series, providing a series of snapshot analyses designed to 73% within the 16 – 24 year old age range.3 to identify key trends and patterns which can provide The industry is expansive and allows huge the groundwork for future analysis.
    [Show full text]
  • Understanding the Qanon Conspiracy from the Perspective of Canonical Information
    The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information Max Aliapoulios*;y, Antonis Papasavva∗;z, Cameron Ballardy, Emiliano De Cristofaroz, Gianluca Stringhini, Savvas Zannettou◦, and Jeremy Blackburn∓ yNew York University, zUniversity College London, Boston University, ◦Max Planck Institute for Informatics, ∓Binghamton University [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] — iDRAMA, https://idrama.science — Abstract administration of a vaccine [54]. Some of these theories can threaten democracy itself [46, 50]; e.g., Pizzagate emerged The QAnon conspiracy theory claims that a cabal of (literally) during the 2016 US Presidential elections and claimed that blood-thirsty politicians and media personalities are engaged Hillary Clinton was involved in a pedophile ring [51]. in a war to destroy society. By interpreting cryptic “drops” of A specific example of the negative consequences social me- information from an anonymous insider calling themself Q, dia can have is the QAnon conspiracy theory. It originated on adherents of the conspiracy theory believe that Donald Trump the Politically Incorrect Board (/pol/) of the anonymous im- is leading them in an active fight against this cabal. QAnon ageboard 4chan via a series of posts from a user going by the has been covered extensively by the media, as its adherents nickname Q. Claiming to be a US government official, Q de- have been involved in multiple violent acts, including the Jan- scribed a vast conspiracy of actors who have infiltrated the US uary 6th, 2021 seditious storming of the US Capitol building.
    [Show full text]
  • Piercing the Religious Veil of the So-Called Cults Joey Peter Moore
    Pepperdine Law Review Volume 7 | Issue 3 Article 6 4-15-1980 Piercing the Religious Veil of the So-Called Cults Joey Peter Moore Follow this and additional works at: http://digitalcommons.pepperdine.edu/plr Part of the First Amendment Commons, and the Religion Law Commons Recommended Citation Joey Peter Moore Piercing the Religious Veil of the So-Called Cults , 7 Pepp. L. Rev. 3 (1980) Available at: http://digitalcommons.pepperdine.edu/plr/vol7/iss3/6 This Comment is brought to you for free and open access by the School of Law at Pepperdine Digital Commons. It has been accepted for inclusion in Pepperdine Law Review by an authorized administrator of Pepperdine Digital Commons. For more information, please contact [email protected]. Piercing the Religious Veil of the So-Called Cults Since the horror of Jonestown, religious cults have been a frequent sub- ject of somewhat speculative debate. Federal and state governments, and private groups alike have undertaken exhaustive studies of these "cults" in order to monitor and sometimes regulate their activities, and to publicize their often questionable tenets and practices. The author offers a compre- hensive overview of these studies, concentrating on such areas as recruit- ment, indoctrination, deprogramming, fund raising, and tax exemption and evasion. Additionally, the author summarizes related news events and profiles to illustrate these observations,and to provide the stimulusfor further thought and analysis as to the impact these occurrences may have on the future of religion and religiousfreedom. I. INTRODUCTION An analysis of public opinion would likely reveal that the exist- ence of religious cults' is a relatively new phenomenon, but his- torians, social scientists and students of religion alike are quick to point out that such groups, though cyclical in nature, have simi- 2 larly prospered and have encountered adversity for centuries.
    [Show full text]
  • Covid-19 Disinformation Briefing No. 2 Far-Right Mobilisation
    COVID-19 DISINFORMATION BRIEFING NO. 2 FAR-RIGHT MOBILISATION 9th April 2020 This is the second in a series of briefings from ISD’s Digital Research Unit on the information ecosystem around coronavirus (COVID-19). These briefings expose how technology platforms are being used to promote disinformation, hate, extremism and authoritarianism in the context of COVID-19. It is based on ISD’s mixture of natural language processing, network analysis and ethnographic online research. This briefing focuses on the way far-right groups and individuals are mobilising around COVID-19 in the US. The first briefing in the series can be found on ISD’s website. Top Lines Far-right groups and individuals are opportunistically using the ongoing pandemic to advance their movements and ideologies: - COVID-19 is an increasingly important topic within far-right communities. Mentions of ‘corona-chan’, a slang term for COVID-19 popular with far-right groups and individuals have increased significantly across mainstream and fringe social media platforms. - COVID-19 is being used as a ‘wedge issue’ to promote conspiracy theories, target minority communities, and call for extreme violence. COVID-19 is being used to advance calls for the ‘boogaloo’ – an extreme right-wing meme referring to an impending civil war: - While some of these calls appear to be ironic, others should be recognised as legitimate security threats. - Discussions of the ‘boogaloo’ are increasingly pivoting towards the ways the COVID- 19 pandemic provides an opportunity for violence. - This conversation is taking place across mainstream and fringe social media. - This trend has already manifested into real-world violence, with one alleged white supremacist terrorist dying after shootouts with the FBI.
    [Show full text]
  • 2.3 Blockchain
    POLITECNICO DI TORINO Corso di Laurea Magistrale in Ingegneria Informatica - Data Science Tesi di Laurea Magistrale Supporting the portability of profiles using the blockchain in the Mastodon social network Relatore Candidato prof. Giovanni Squillero Alessandra Rossaro Anno Accademico 2018-2019 École polytechnique de Louvain Supporting the portability of profiles using the blockchain in the Mastodon social network Authors: Alessandra ROSSARO, Corentin SURQUIN Supervisors: Etienne RIVIERE, Ramin SADRE Readers: Lionel DRICOT, Axel LEGAY, Giovanni SQUILLERO Academic year 2018–2019 Master [120] in Computer Science Acknowledgements We would like to thank anyone who made the writing of this thesis possible, directly or indirectly. First of all, we would like to thank our supervisors, Prof. Etienne Riviere and Prof. Ramin Sadre for their continous support and advice during the year. We would never have gone this far without them. Secondly, we thank Lionel Dricot, Prof. Axel Legay and Prof. Giovanni Squillero for accepting to be the readers of this thesis. Alessandra First of all, I would like to thank my family, my parents Claudia and Alberto, my brother Stefano and my sister Eleonora, that from the beginning of my studies believed in me, every time urging me to give more and sustaining me each time that I had difficulties. They are my strength and I feel really lucky to have them in my life. Another thanks is to my friends, to Soraya, Beatrice, Sinto and Stefano and especially to Matteo and Edoardo that each time that I needed, remember me to believe in myself and don’t give up. Thank you, sincerely! I would like to thank also my partner, Corentin, because we were a great team, sometimes with some misunderstandings, but I appreciated to work at this project with him! Corentin I must express my deep gratitude to my family and friends for their moral support.
    [Show full text]
  • The Qanon Conspiracy
    THE QANON CONSPIRACY: Destroying Families, Dividing Communities, Undermining Democracy THE QANON CONSPIRACY: PRESENTED BY Destroying Families, Dividing Communities, Undermining Democracy NETWORK CONTAGION RESEARCH INSTITUTE POLARIZATION AND EXTREMISM RESEARCH POWERED BY (NCRI) INNOVATION LAB (PERIL) Alex Goldenberg Brian Hughes Lead Intelligence Analyst, The Network Contagion Research Institute Caleb Cain Congressman Denver Riggleman Meili Criezis Jason Baumgartner Kesa White The Network Contagion Research Institute Cynthia Miller-Idriss Lea Marchl Alexander Reid-Ross Joel Finkelstein Director, The Network Contagion Research Institute Senior Research Fellow, Miller Center for Community Protection and Resilience, Rutgers University SPECIAL THANKS TO THE PERIL QANON ADVISORY BOARD Jaclyn Fox Sarah Hightower Douglas Rushkoff Linda Schegel THE QANON CONSPIRACY ● A CONTAGION AND IDEOLOGY REPORT FOREWORD “A lie doesn’t become truth, wrong doesn’t become right, and evil doesn’t become good just because it’s accepted by the majority.” –Booker T. Washington As a GOP Congressman, I have been uniquely positioned to experience a tumultuous two years on Capitol Hill. I voted to end the longest government shut down in history, was on the floor during impeachment, read the Mueller Report, governed during the COVID-19 pandemic, officiated a same-sex wedding (first sitting GOP congressman to do so), and eventually became the only Republican Congressman to speak out on the floor against the encroaching and insidious digital virus of conspiracy theories related to QAnon. Certainly, I can list the various theories that nest under the QAnon banner. Democrats participate in a deep state cabal as Satan worshiping pedophiles and harvesting adrenochrome from children. President-Elect Joe Biden ordered the killing of Seal Team 6.
    [Show full text]
  • Download Criminal Complaint Filed in the Eastern District of California
    AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the Eastern District of California United States of America ) V. ) MARCOS PAULO DE OLIVEIRA­ ) Case No. ANNIBALE, ) aka "Med3lin," ) aka "Med3lln," ) aka "Med3lln WSM" ) Defendant(s) CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. On or about the date( s) of October 2017 through April 2019__ in the county of Sacramento in the Eastern District of California , and elsewhere, the defendant(s) violated: Code Section Offense Description 21 U.S.C. §§ 841 and 846 Distribution and Conspiracy to Distribute Controlled Substances 18 U.S.C. §§ 1956 and 1957 Money Laundering This criminal complaint is based on these facts: (see attachment) IX! Continued on the attached sheet. -j- ;1 ·) / , / l 1 - • / L ',;;;_ . _/__I-- / Complainant's signature JAY D. DIAL, Jr., Special Agent Dl'llg Enforcem~_11t Ad111inistration Printed name and title Sworn to before me and signed in my presence. ;]t "-" ' Date: l.2 _/,_ I ---=- (.___ ,,--- "'-~ Judge 's signature City and state: Sacramento, CA Allls__on Claire, U_.§~ Magi~trate__.J__udge Printed name and title AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the Eastern District of California United States of America ) V. ) MARCOS PAULO DE OLIVEIRA­ ) Case No. ANNIBALE, ) aka "Med3lin," ) aka "Med3l1n," ) aka "Med3lln_WSM" ) Defendant(s) CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. On or about the date(s) of ~tober 20 I 7 through April 2019_ in the county of .
    [Show full text]
  • Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center
    Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center before the Subcommittee on National Security, International Development and Monetary Policy Committee on Financial Services United States House of Representatives Dollars against Democracy: Domestic Terrorist Financing in the Aftermath of Insurrection February 25, 2021 My name is Lecia Brooks. I am chief of staff of the Southern Poverty Law Center (SPLC). Now in our 50th year, the SPLC is a catalyst for racial justice in the South and beyond, working in partnership with communities to dismantle white supremacy, strengthen intersectional movements, and advance the human rights of all people. SPLC lawyers have worked to shut down some of the nation’s most violent white supremacist groups by winning crushing, multimillion-dollar jury verdicts on behalf of their victims. We have helped dismantle vestiges of Jim Crow, reformed juvenile justice practices, shattered barriers to equality for women, children, the LGBTQ+ community, and the disabled, and worked to protect low-wage immigrant workers from exploitation. The SPLC began tracking white supremacist activity in the 1980s, during a resurgence of the Ku Klux Klan and other organized extremist hate groups. Today, the SPLC is the premier U.S. nonprofit organization monitoring the activities of domestic hate groups and other extremists. In the early 1990s, the SPLC launched its pioneering Teaching Tolerance program to provide educators with free, anti-bias classroom resources, such as classroom documentaries and lesson plans. Now renamed Learning For Justice, our program reaches millions of schoolchildren with award-winning curricula and other materials that promote understanding of our nation’s history and respect for others, helping educators create inclusive, equitable school environments.
    [Show full text]
  • On the Security of Electroneum Cloud Mining
    This Selfie Does Not Exist: On the Security of Electroneum Cloud Mining Alexander Marsalek1, Edona Fasllija2 and Dominik Ziegler3 1Secure Information Technology Center Austria, Vienna, Austria 2Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria 3Know-Center GmbH, Graz, Austria Keywords: Electroneum Cloud Mining, Cryptocurrency, Impersonation Attack, Image Manipulation. Abstract: The Electroneum cryptocurrency provides a novel mining experience called “cloud mining”, which enables iOS and Android users to regularly earn cryptocurrency tokens by simply interacting with the Electroneum app. Besides other security countermeasures against automated attacks, Electroneum requires the user to up- load selfies with a predefined gesture or a drawing of a symbol as a prerequisite for the activation of the mining process. In this paper, we show how a malicious user can circumvent all of these security features and thus create and maintain an arbitrary number of fake accounts. Our impersonation attack particularly focuses on creating non-existing selfies by relying on Generative Adversarial Network (GAN) techniques during account initialization. Furthermore, we employ reverse engineering to develop a bot that simulates the genuine Elec- troneum app and is capable of operating an arbitrary number of illegitimate accounts on one Android device, enabling the malicious user to obtain an unfairly large payout. 1 INTRODUCTION Rivet, 2019). Due to these effects, both Google and Apple prohibit cryptocurrency mining apps from their During 2017, the first and most popular cryptocurrency, application stores (Apple, 2019; Google, 2018), limiting Bitcoin, experienced an astonishing 13-fold increase in the accessibility of the average smartphone users to crypto mining. Despite this fact, several projects like value (Corcoran, 2017).
    [Show full text]
  • False Imprisonment, Religious Cults, and the Destruction of Volitional Capacity
    Valparaiso University Law Review Volume 25 Number 3 Spring 1991 pp.407-454 Spring 1991 He Who Controls the Mind Controls the Body: False Imprisonment, Religious Cults, and the Destruction of Volitional Capacity Laura B. Brown Follow this and additional works at: https://scholar.valpo.edu/vulr Part of the Law Commons Recommended Citation Laura B. Brown, He Who Controls the Mind Controls the Body: False Imprisonment, Religious Cults, and the Destruction of Volitional Capacity, 25 Val. U. L. Rev. 407 (1991). Available at: https://scholar.valpo.edu/vulr/vol25/iss3/4 This Notes is brought to you for free and open access by the Valparaiso University Law School at ValpoScholar. It has been accepted for inclusion in Valparaiso University Law Review by an authorized administrator of ValpoScholar. For more information, please contact a ValpoScholar staff member at [email protected]. Brown: He Who Controls the Mind Controls the Body: False Imprisonment, NOTES HE WHO CONTROLS THE MIND CONTROLS THE BODY: FALSE IMPRISONMENT, RELIGIOUS CULTS, AND THE DESTRUCTION OF VOLITIONAL CAPACITY The pressures and stresses of life in modem society can overwhelm all of us at times. The competing demands on time and financial resources created by marriage, family, and career responsibilities are becoming increasingly difficult to balance. I At one time or another, each of us may secretly wish that our lives were less stressful and demanding. 2 At such times, we might be tempted to abandon pressing responsibilities to explore an alternative lifestyle.3 Yet, few of us would be willing to give up our ability to choose to return to our former lives as part of the bargain.
    [Show full text]