Building Resilience & Confronting Risk In
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Download Download
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media (ICWSM 2021) A Large Open Dataset from the Parler Social Network Max Aliapoulios1, Emmi Bevensee2, Jeremy Blackburn3, Barry Bradlyn4, Emiliano De Cristofaro5, Gianluca Stringhini6, Savvas Zannettou7 1New York University, 2SMAT, 3Binghamton University, 4University of Illinois at Urbana-Champaign, 5University College London, 6Boston University, 7Max Planck Institute for Informatics [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract feasible in technical terms to create a new social media plat- Parler is as an “alternative” social network promoting itself form, but marketing the platform towards specific polarized as a service that allows to “speak freely and express yourself communities is an extremely successful strategy to bootstrap openly, without fear of being deplatformed for your views.” a user base. In other words, there is a subset of users on Twit- Because of this promise, the platform become popular among ter, Facebook, Reddit, etc., that will happily migrate to a new users who were suspended on mainstream social networks platform, especially if it advertises moderation policies that for violating their terms of service, as well as those fearing do not restrict the growth and spread of political polariza- censorship. In particular, the service was endorsed by several tion, conspiracy theories, extremist ideology, hateful and vi- conservative public figures, encouraging people to migrate olent speech, and mis- and dis-information. from traditional social networks. After the storming of the US Capitol on January 6, 2021, Parler has been progressively de- Parler. -
Riots: a Comparative Study of Twitter and Parler
111 Capitol (Pat)riots: A comparative study of Twitter and Parler HITKUL, IIIT - Delhi, India AVINASH PRABHU∗, DIPANWITA GUHATHAKURTA∗, JIVITESH JAIN∗, MALLIKA SUBRA- MANIAN∗, MANVITH REDDY∗, SHRADHA SEHGAL∗, and TANVI KARANDIKAR∗, IIIT - Hy- derabad, India AMOGH GULATI∗ and UDIT ARORA∗, IIIT - Delhi, India RAJIV RATN SHAH, IIIT - Delhi, India PONNURANGAM KUMARAGURU, IIIT - Delhi, India On 6 January 2021, a mob of right-wing conservatives stormed the USA Capitol Hill interrupting the session of congress certifying 2020 Presidential election results. Immediately after the start of the event, posts related to the riots started to trend on social media. A social media platform which stood out was a free speech endorsing social media platform Parler; it is being claimed as the platform on which the riots were planned and talked about. Our report presents a contrast between the trending content on Parler and Twitter around the time of riots. We collected data from both platforms based on the trending hashtags and draw comparisons based on what are the topics being talked about, who are the people active on the platforms and how organic is the content generated on the two platforms. While the content trending on Twitter had strong resentments towards the event and called for action against rioters and inciters, Parler content had a strong conservative narrative echoing the ideas of voter fraud similar to the attacking mob. We also find a disproportionately high manipulation of traffic on Parler when compared to Twitter. Additional Key Words and Phrases: Social Computing, Data Mining, Social Media Analysis, Capitol Riots, Parler, Twitter 1 INTRODUCTION Misinformation of the United States of America’s presidential election results being fraudulent has been spreading across the world since the elections in November 2020.1 Public protests and legal cases were taking place across the states against the allegation of voter fraud and manhandling of mail-in ballots.2 This movement took a violent height when a mob attacked the Capitol Hill building to stop certification of Mr. -
Gamers Who Hate: an Introduction to ISD's Gaming and Extremism Series
Gaming and Extremism Gamers Who Hate: An Introduction to ISD’s Gaming and Extremism Series Jacob Davey About the series This briefing is the first in ISD’s Gaming and Extremism Series exploring the role online gaming plays in the strategy of far-right extremists in the UK and globally. This is part of a broader programme on the ‘Future of Extremism’ being delivered by ISD in the second half of 2021, charting the transformational shifts in the extremist threat landscape two decades on from 9/11, and the policy strategies required to counter the next generation of extremist threats. This briefing provides an introduction to the series and presents the key findings that ISD analysts found in an exploratory study into extremist activity on four gaming-related platforms, Steam, Discord, DLive and Twitch. Gaming and Extremism Contents 3 Contents Introduction 4 Key Findings 6 Methodology 10 Endnotes 11 Gaming and Extremism Gamers Who Hate 4 Introduction Globally, gaming is now the most profitable To help fill this crucial evidence gap ISD engaged in a entertainment industry, far surpassing both music scoping project exploring the use of the gaming-related and film.1 According to the gaming market data platforms Steam, Discord, Twitch and DLive by the company Newzoo, there are 2.81 billion gamers extreme right, concentrating specifically on the UK. worldwide2 and in the United Kingdom 39% of the This work is presented in our Gaming and Extremism population play video games, a figure that rises series, providing a series of snapshot analyses designed to 73% within the 16 – 24 year old age range.3 to identify key trends and patterns which can provide The industry is expansive and allows huge the groundwork for future analysis. -
Understanding the Qanon Conspiracy from the Perspective of Canonical Information
The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information Max Aliapoulios*;y, Antonis Papasavva∗;z, Cameron Ballardy, Emiliano De Cristofaroz, Gianluca Stringhini, Savvas Zannettou◦, and Jeremy Blackburn∓ yNew York University, zUniversity College London, Boston University, ◦Max Planck Institute for Informatics, ∓Binghamton University [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] — iDRAMA, https://idrama.science — Abstract administration of a vaccine [54]. Some of these theories can threaten democracy itself [46, 50]; e.g., Pizzagate emerged The QAnon conspiracy theory claims that a cabal of (literally) during the 2016 US Presidential elections and claimed that blood-thirsty politicians and media personalities are engaged Hillary Clinton was involved in a pedophile ring [51]. in a war to destroy society. By interpreting cryptic “drops” of A specific example of the negative consequences social me- information from an anonymous insider calling themself Q, dia can have is the QAnon conspiracy theory. It originated on adherents of the conspiracy theory believe that Donald Trump the Politically Incorrect Board (/pol/) of the anonymous im- is leading them in an active fight against this cabal. QAnon ageboard 4chan via a series of posts from a user going by the has been covered extensively by the media, as its adherents nickname Q. Claiming to be a US government official, Q de- have been involved in multiple violent acts, including the Jan- scribed a vast conspiracy of actors who have infiltrated the US uary 6th, 2021 seditious storming of the US Capitol building. -
Piercing the Religious Veil of the So-Called Cults Joey Peter Moore
Pepperdine Law Review Volume 7 | Issue 3 Article 6 4-15-1980 Piercing the Religious Veil of the So-Called Cults Joey Peter Moore Follow this and additional works at: http://digitalcommons.pepperdine.edu/plr Part of the First Amendment Commons, and the Religion Law Commons Recommended Citation Joey Peter Moore Piercing the Religious Veil of the So-Called Cults , 7 Pepp. L. Rev. 3 (1980) Available at: http://digitalcommons.pepperdine.edu/plr/vol7/iss3/6 This Comment is brought to you for free and open access by the School of Law at Pepperdine Digital Commons. It has been accepted for inclusion in Pepperdine Law Review by an authorized administrator of Pepperdine Digital Commons. For more information, please contact [email protected]. Piercing the Religious Veil of the So-Called Cults Since the horror of Jonestown, religious cults have been a frequent sub- ject of somewhat speculative debate. Federal and state governments, and private groups alike have undertaken exhaustive studies of these "cults" in order to monitor and sometimes regulate their activities, and to publicize their often questionable tenets and practices. The author offers a compre- hensive overview of these studies, concentrating on such areas as recruit- ment, indoctrination, deprogramming, fund raising, and tax exemption and evasion. Additionally, the author summarizes related news events and profiles to illustrate these observations,and to provide the stimulusfor further thought and analysis as to the impact these occurrences may have on the future of religion and religiousfreedom. I. INTRODUCTION An analysis of public opinion would likely reveal that the exist- ence of religious cults' is a relatively new phenomenon, but his- torians, social scientists and students of religion alike are quick to point out that such groups, though cyclical in nature, have simi- 2 larly prospered and have encountered adversity for centuries. -
Covid-19 Disinformation Briefing No. 2 Far-Right Mobilisation
COVID-19 DISINFORMATION BRIEFING NO. 2 FAR-RIGHT MOBILISATION 9th April 2020 This is the second in a series of briefings from ISD’s Digital Research Unit on the information ecosystem around coronavirus (COVID-19). These briefings expose how technology platforms are being used to promote disinformation, hate, extremism and authoritarianism in the context of COVID-19. It is based on ISD’s mixture of natural language processing, network analysis and ethnographic online research. This briefing focuses on the way far-right groups and individuals are mobilising around COVID-19 in the US. The first briefing in the series can be found on ISD’s website. Top Lines Far-right groups and individuals are opportunistically using the ongoing pandemic to advance their movements and ideologies: - COVID-19 is an increasingly important topic within far-right communities. Mentions of ‘corona-chan’, a slang term for COVID-19 popular with far-right groups and individuals have increased significantly across mainstream and fringe social media platforms. - COVID-19 is being used as a ‘wedge issue’ to promote conspiracy theories, target minority communities, and call for extreme violence. COVID-19 is being used to advance calls for the ‘boogaloo’ – an extreme right-wing meme referring to an impending civil war: - While some of these calls appear to be ironic, others should be recognised as legitimate security threats. - Discussions of the ‘boogaloo’ are increasingly pivoting towards the ways the COVID- 19 pandemic provides an opportunity for violence. - This conversation is taking place across mainstream and fringe social media. - This trend has already manifested into real-world violence, with one alleged white supremacist terrorist dying after shootouts with the FBI. -
2.3 Blockchain
POLITECNICO DI TORINO Corso di Laurea Magistrale in Ingegneria Informatica - Data Science Tesi di Laurea Magistrale Supporting the portability of profiles using the blockchain in the Mastodon social network Relatore Candidato prof. Giovanni Squillero Alessandra Rossaro Anno Accademico 2018-2019 École polytechnique de Louvain Supporting the portability of profiles using the blockchain in the Mastodon social network Authors: Alessandra ROSSARO, Corentin SURQUIN Supervisors: Etienne RIVIERE, Ramin SADRE Readers: Lionel DRICOT, Axel LEGAY, Giovanni SQUILLERO Academic year 2018–2019 Master [120] in Computer Science Acknowledgements We would like to thank anyone who made the writing of this thesis possible, directly or indirectly. First of all, we would like to thank our supervisors, Prof. Etienne Riviere and Prof. Ramin Sadre for their continous support and advice during the year. We would never have gone this far without them. Secondly, we thank Lionel Dricot, Prof. Axel Legay and Prof. Giovanni Squillero for accepting to be the readers of this thesis. Alessandra First of all, I would like to thank my family, my parents Claudia and Alberto, my brother Stefano and my sister Eleonora, that from the beginning of my studies believed in me, every time urging me to give more and sustaining me each time that I had difficulties. They are my strength and I feel really lucky to have them in my life. Another thanks is to my friends, to Soraya, Beatrice, Sinto and Stefano and especially to Matteo and Edoardo that each time that I needed, remember me to believe in myself and don’t give up. Thank you, sincerely! I would like to thank also my partner, Corentin, because we were a great team, sometimes with some misunderstandings, but I appreciated to work at this project with him! Corentin I must express my deep gratitude to my family and friends for their moral support. -
The Qanon Conspiracy
THE QANON CONSPIRACY: Destroying Families, Dividing Communities, Undermining Democracy THE QANON CONSPIRACY: PRESENTED BY Destroying Families, Dividing Communities, Undermining Democracy NETWORK CONTAGION RESEARCH INSTITUTE POLARIZATION AND EXTREMISM RESEARCH POWERED BY (NCRI) INNOVATION LAB (PERIL) Alex Goldenberg Brian Hughes Lead Intelligence Analyst, The Network Contagion Research Institute Caleb Cain Congressman Denver Riggleman Meili Criezis Jason Baumgartner Kesa White The Network Contagion Research Institute Cynthia Miller-Idriss Lea Marchl Alexander Reid-Ross Joel Finkelstein Director, The Network Contagion Research Institute Senior Research Fellow, Miller Center for Community Protection and Resilience, Rutgers University SPECIAL THANKS TO THE PERIL QANON ADVISORY BOARD Jaclyn Fox Sarah Hightower Douglas Rushkoff Linda Schegel THE QANON CONSPIRACY ● A CONTAGION AND IDEOLOGY REPORT FOREWORD “A lie doesn’t become truth, wrong doesn’t become right, and evil doesn’t become good just because it’s accepted by the majority.” –Booker T. Washington As a GOP Congressman, I have been uniquely positioned to experience a tumultuous two years on Capitol Hill. I voted to end the longest government shut down in history, was on the floor during impeachment, read the Mueller Report, governed during the COVID-19 pandemic, officiated a same-sex wedding (first sitting GOP congressman to do so), and eventually became the only Republican Congressman to speak out on the floor against the encroaching and insidious digital virus of conspiracy theories related to QAnon. Certainly, I can list the various theories that nest under the QAnon banner. Democrats participate in a deep state cabal as Satan worshiping pedophiles and harvesting adrenochrome from children. President-Elect Joe Biden ordered the killing of Seal Team 6. -
Download Criminal Complaint Filed in the Eastern District of California
AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the Eastern District of California United States of America ) V. ) MARCOS PAULO DE OLIVEIRA ) Case No. ANNIBALE, ) aka "Med3lin," ) aka "Med3lln," ) aka "Med3lln WSM" ) Defendant(s) CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. On or about the date( s) of October 2017 through April 2019__ in the county of Sacramento in the Eastern District of California , and elsewhere, the defendant(s) violated: Code Section Offense Description 21 U.S.C. §§ 841 and 846 Distribution and Conspiracy to Distribute Controlled Substances 18 U.S.C. §§ 1956 and 1957 Money Laundering This criminal complaint is based on these facts: (see attachment) IX! Continued on the attached sheet. -j- ;1 ·) / , / l 1 - • / L ',;;;_ . _/__I-- / Complainant's signature JAY D. DIAL, Jr., Special Agent Dl'llg Enforcem~_11t Ad111inistration Printed name and title Sworn to before me and signed in my presence. ;]t "-" ' Date: l.2 _/,_ I ---=- (.___ ,,--- "'-~ Judge 's signature City and state: Sacramento, CA Allls__on Claire, U_.§~ Magi~trate__.J__udge Printed name and title AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the Eastern District of California United States of America ) V. ) MARCOS PAULO DE OLIVEIRA ) Case No. ANNIBALE, ) aka "Med3lin," ) aka "Med3l1n," ) aka "Med3lln_WSM" ) Defendant(s) CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. On or about the date(s) of ~tober 20 I 7 through April 2019_ in the county of . -
Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center
Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center before the Subcommittee on National Security, International Development and Monetary Policy Committee on Financial Services United States House of Representatives Dollars against Democracy: Domestic Terrorist Financing in the Aftermath of Insurrection February 25, 2021 My name is Lecia Brooks. I am chief of staff of the Southern Poverty Law Center (SPLC). Now in our 50th year, the SPLC is a catalyst for racial justice in the South and beyond, working in partnership with communities to dismantle white supremacy, strengthen intersectional movements, and advance the human rights of all people. SPLC lawyers have worked to shut down some of the nation’s most violent white supremacist groups by winning crushing, multimillion-dollar jury verdicts on behalf of their victims. We have helped dismantle vestiges of Jim Crow, reformed juvenile justice practices, shattered barriers to equality for women, children, the LGBTQ+ community, and the disabled, and worked to protect low-wage immigrant workers from exploitation. The SPLC began tracking white supremacist activity in the 1980s, during a resurgence of the Ku Klux Klan and other organized extremist hate groups. Today, the SPLC is the premier U.S. nonprofit organization monitoring the activities of domestic hate groups and other extremists. In the early 1990s, the SPLC launched its pioneering Teaching Tolerance program to provide educators with free, anti-bias classroom resources, such as classroom documentaries and lesson plans. Now renamed Learning For Justice, our program reaches millions of schoolchildren with award-winning curricula and other materials that promote understanding of our nation’s history and respect for others, helping educators create inclusive, equitable school environments. -
On the Security of Electroneum Cloud Mining
This Selfie Does Not Exist: On the Security of Electroneum Cloud Mining Alexander Marsalek1, Edona Fasllija2 and Dominik Ziegler3 1Secure Information Technology Center Austria, Vienna, Austria 2Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria 3Know-Center GmbH, Graz, Austria Keywords: Electroneum Cloud Mining, Cryptocurrency, Impersonation Attack, Image Manipulation. Abstract: The Electroneum cryptocurrency provides a novel mining experience called “cloud mining”, which enables iOS and Android users to regularly earn cryptocurrency tokens by simply interacting with the Electroneum app. Besides other security countermeasures against automated attacks, Electroneum requires the user to up- load selfies with a predefined gesture or a drawing of a symbol as a prerequisite for the activation of the mining process. In this paper, we show how a malicious user can circumvent all of these security features and thus create and maintain an arbitrary number of fake accounts. Our impersonation attack particularly focuses on creating non-existing selfies by relying on Generative Adversarial Network (GAN) techniques during account initialization. Furthermore, we employ reverse engineering to develop a bot that simulates the genuine Elec- troneum app and is capable of operating an arbitrary number of illegitimate accounts on one Android device, enabling the malicious user to obtain an unfairly large payout. 1 INTRODUCTION Rivet, 2019). Due to these effects, both Google and Apple prohibit cryptocurrency mining apps from their During 2017, the first and most popular cryptocurrency, application stores (Apple, 2019; Google, 2018), limiting Bitcoin, experienced an astonishing 13-fold increase in the accessibility of the average smartphone users to crypto mining. Despite this fact, several projects like value (Corcoran, 2017). -
False Imprisonment, Religious Cults, and the Destruction of Volitional Capacity
Valparaiso University Law Review Volume 25 Number 3 Spring 1991 pp.407-454 Spring 1991 He Who Controls the Mind Controls the Body: False Imprisonment, Religious Cults, and the Destruction of Volitional Capacity Laura B. Brown Follow this and additional works at: https://scholar.valpo.edu/vulr Part of the Law Commons Recommended Citation Laura B. Brown, He Who Controls the Mind Controls the Body: False Imprisonment, Religious Cults, and the Destruction of Volitional Capacity, 25 Val. U. L. Rev. 407 (1991). Available at: https://scholar.valpo.edu/vulr/vol25/iss3/4 This Notes is brought to you for free and open access by the Valparaiso University Law School at ValpoScholar. It has been accepted for inclusion in Valparaiso University Law Review by an authorized administrator of ValpoScholar. For more information, please contact a ValpoScholar staff member at [email protected]. Brown: He Who Controls the Mind Controls the Body: False Imprisonment, NOTES HE WHO CONTROLS THE MIND CONTROLS THE BODY: FALSE IMPRISONMENT, RELIGIOUS CULTS, AND THE DESTRUCTION OF VOLITIONAL CAPACITY The pressures and stresses of life in modem society can overwhelm all of us at times. The competing demands on time and financial resources created by marriage, family, and career responsibilities are becoming increasingly difficult to balance. I At one time or another, each of us may secretly wish that our lives were less stressful and demanding. 2 At such times, we might be tempted to abandon pressing responsibilities to explore an alternative lifestyle.3 Yet, few of us would be willing to give up our ability to choose to return to our former lives as part of the bargain.