Abstract Discovering Credible Events in Near

Total Page:16

File Type:pdf, Size:1020Kb

Abstract Discovering Credible Events in Near ABSTRACT Title of dissertation: DISCOVERING CREDIBLE EVENTS IN NEAR REAL TIME FROM SOCIAL MEDIA STREAMS Cody Buntain, Doctor of Philosophy, 2016 Dissertation directed by: Professor Jennifer Golbeck School of Information Recent reliance on social media platforms as major sources of news and infor- mation, both for journalists and the larger population and especially during times of crisis, motivate the need for better methods of identifying and tracking high-impact events in these social media streams. Social media's volume, velocity, and democrati- zation of information (leading to limited quality controls) complicate rapid discovery of these events and one's ability to trust the content posted about these events. This dissertation addresses these complications in four stages, using Twitter as a model social platform. The first stage analyzes Twitter's response to major crises, specif- ically terrorist attacks in Western countries, showing these high-impact events do not significantly impact message or user volume. Instead, these events drive changes in Twitter's topic distribution, with conversation, retweets, and hashtags relevant to these events experiencing significant, rapid, and short-lived bursts in frequency. Furthermore, conversation participants tend to prefer information from local author- ities/organizations/media over national or international sources, with accounts for local police or local newspapers often emerging as central in the networks of inter- action. Building on these results, the second stage in this dissertation presents and evaluates a set of features that capture these topical bursts associated with crises by modeling bursts in frequency for individual tokens in the Twitter stream. The resulting streaming algorithm is capable of discovering notable moments across a series of major sports competitions using Twitter's public stream without relying on domain- or language-specific information or models. Furthermore, results demon- strate models trained on sporting competition data perform well when transferred to earthquake identification. This streaming algorithm is then extended in this dis- sertation's third stage to support real-time event tracking and summarization. This real-time algorithm leverages new distributed processing technology to operate at scale and is evaluated against a collection of other community-developed information retrieval systems, where it performs comparably. Further experiments also show this real-time burst detection algorithm can be integrated with these other information retrieval systems to increase overall performance. The final stage then investigates automated methods for evaluating credibility in social media streams by leveraging two existing data sets. These two data sets measure different types of credibility (veracity versus perception), and results show veracity is negatively correlated with the amount of disagreement in and length of a conversation, and perceptions of credibility are influenced by the amount of links to other pages, shared media about the event, and the number of verified users participating in the discussion. Contri- butions made across these four stages are then usable in the relatively new fields of computational journalism and crisis informatics, which seek to improve news gather- ing and crisis response by leveraging new technologies and data sources like machine learning and social media. DISCOVERING CREDIBLE EVENTS IN NEAR REAL TIME FROM SOCIAL MEDIA STREAMS by Cody Buntain Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park in partial fulfillment of the requirements for the degree of Doctor of Philosophy 2016 Advisory Committee: Professor Jennifer Golbeck, Chair/Advisor Professor Jimmy Lin Professor Nicholas Diakopoulos Professor Hector Corrada Bravo Professor V.S. Subrahmanian c Copyright by Cody Buntain 2016 Dedication To the two most important people in my life: Leslie and Leigh. Their support, encouragement, and patience cannot be adequately thanked. ii Acknowledgments This work simply would not exist without the encouragement of my advisor, Jennifer Golbeck. Her support and trust allowed me to find my own path as a scientist, and she was always there with a light hand to guide me when I became too lost or discouraged. Jen has been and will continue to be a role model for me in my academic career. I have benefitted from the insight of several other mentors over the course of this work as well. This research owes a great debt to Jimmy Lin, without whose assistance would have made for a more difficult, slow, and expensive effort. His al- lowances for my access to large stores of data, state-of-the-art processing infrastruc- ture, and a community of researchers contributed significantly to the investigations detailed herein and spurred my interest in large-scale data science. A special thanks is also owed to the remaining members of my committee: Nick Diakopoulos, Hector Corrada Bravo, and V.S. Subrahmanian. Their excellent questions, insights, and suggestions contributed greatly to this document's final form. Given this research's focus on social networks, I would be remiss not to thank my own social network, whose role as an intellectual sounding board and emotional support cannot be understated. Thanks to Phil, Robin, Sana, both Steves, Jay, Matt, Brenna, Kris, both Amandas, Adam, Greg, and Christine. Likewise, the trust and collaboration I received from Sandy and Michael Ring and my previous colleagues at Pikewerks contributed a great deal to my growth as a scientist and iii researcher. Finally, I want to thank my family: my mother, my sister, and Leigh for their continued encouragement and patience. Without my mother's incredible efforts to raise my sister and I as a single mother, none of this would be possible. Thank you. iv Table of Contents List of Tables viii List of Figures ix List of Abbreviationsx 1 Introduction1 1.1 Contributions...............................4 1.2 Dissertation Roadmap..........................8 2 Relevant Work on Social Media Analysis 12 2.1 Social Media, Terrorism, and Crisis Informatics............ 14 2.2 Event Detection.............................. 16 2.3 Credibility and Social Media....................... 22 3 Twitter Response to Terrorism 30 3.1 Events and Data Collection....................... 32 3.2 Twitter Behavioral Analysis....................... 33 3.3 Results................................... 36 3.4 Observations................................ 42 3.5 Consequences for Event Detection Algorithms............. 44 3.5.1 Other Future Work........................ 45 3.5.2 Limitations............................ 46 4 Language-Agnostic Event Discovery in Streams 48 4.1 Moment Discovery Defined........................ 51 4.1.1 Problem Definition........................ 51 4.1.2 The LABurst Model....................... 53 4.1.3 Temporal Features........................ 54 4.1.3.1 Frequency Regression................. 55 4.1.3.2 Frequency Differences................. 55 4.1.3.3 Inter-Arrival Time................... 56 4.1.3.4 Entropy......................... 56 v 4.1.3.5 Interaction Graph Density............... 57 4.1.3.6 Term-Frequency, Inverse Document Frequency (TF- IDF)........................... 58 4.1.3.7 Term-Frequency, Proportional Document Frequency (TF-PDF)........................ 58 4.1.3.8 BursT Score....................... 59 4.1.4 Bursty Token Classification................... 59 4.2 Evaluation Framework.......................... 60 4.2.1 Accuracy in Event Discovery................... 60 4.2.1.1 Sporting Competitions................. 61 4.2.1.2 Burst Detection Baselines............... 63 4.2.1.3 Evaluating Accuracy.................. 65 4.2.2 Domain Independence...................... 65 4.3 Data Collection.............................. 67 4.4 Experimental Results........................... 67 4.4.1 Setting Model Parameters.................... 67 4.4.2 Ablation Study.......................... 70 4.4.3 Event Discovery Results..................... 70 4.4.4 Composite Results........................ 72 4.4.5 Earthquake Detection...................... 74 4.5 Comparative Analysis.......................... 76 4.5.1 Identifying Event-Related Tokens................ 76 4.5.2 Discovering Unanticipated Moments............... 78 4.5.3 Addressing the Super Bowl.................... 79 4.6 Limitations and Extensions....................... 80 4.7 Conclusions................................ 81 5 Real-Time Event Discovery 83 5.1 Real-Time Extensions.......................... 84 5.1.1 Processing the Twitter Stream.................. 86 5.1.2 Identifying Bursty Tokens.................... 86 5.1.3 Moment Summarization..................... 87 5.2 Real-Time Topic Tracking........................ 88 5.2.1 Query Construction and Expansion............... 88 5.2.2 Filtering the Twitter Sample Stream.............. 89 5.2.3 Topic-Specific Summarization.................. 90 5.3 Evaluating Real-Time Topic Tracking.................. 90 5.4 NIST Evaluation Results......................... 92 5.5 Ensembles with RTTBurst........................ 95 5.5.1 Gating with RTTBurst...................... 96 5.6 Observations on RTTBurst and Ensembles............... 97 5.7 Conclusions................................ 102 vi 6 Evaluating Truth in Social Media 103 6.1 Data Set Descriptions........................... 105 6.1.1 The PHEME Rumor Data Set.................. 105 6.1.2 The CREDBANK Data Set................... 107 6.1.2.1 Twitter Data Acquisition............... 110 6.1.2.2 Labeling CREDBANK Topics............
Recommended publications
  • Dzhokhar Tsarnaev Had Murdered Krystle Marie Campbell, Lingzi Lu, Martin Richard, and Officer Sean Collier, He Was Here in This Courthouse
    United States Court of Appeals For the First Circuit No. 16-6001 UNITED STATES OF AMERICA, Appellee, v. DZHOKHAR A. TSARNAEV, Defendant, Appellant. APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MASSACHUSETTS [Hon. George A. O'Toole, Jr., U.S. District Judge] Before Torruella, Thompson, and Kayatta, Circuit Judges. Daniel Habib, with whom Deirdre D. von Dornum, David Patton, Mia Eisner-Grynberg, Anthony O'Rourke, Federal Defenders of New York, Inc., Clifford Gardner, Law Offices of Cliff Gardner, Gail K. Johnson, and Johnson & Klein, PLLC were on brief, for appellant. John Remington Graham on brief for James Feltzer, Ph.D., Mary Maxwell, Ph.D., LL.B., and Cesar Baruja, M.D., amici curiae. George H. Kendall, Squire Patton Boggs (US) LLP, Timothy P. O'Toole, and Miller & Chevalier on brief for Eight Distinguished Local Citizens, amici curiae. David A. Ruhnke, Ruhnke & Barrett, Megan Wall-Wolff, Wall- Wolff LLC, Michael J. Iacopino, Brennan Lenehan Iacopino & Hickey, Benjamin Silverman, and Law Office of Benjamin Silverman PLLC on brief for National Association of Criminal Defense Lawyers, amicus curiae. William A. Glaser, Attorney, Appellate Section, Criminal Division, U.S. Department of Justice, with whom Andrew E. Lelling, United States Attorney, Nadine Pellegrini, Assistant United States Attorney, John C. Demers, Assistant Attorney General, National Security Division, John F. Palmer, Attorney, National Security Division, Brian A. Benczkowski, Assistant Attorney General, and Matthew S. Miner, Deputy Assistant Attorney General, were on brief, for appellee. July 31, 2020 THOMPSON, Circuit Judge. OVERVIEW Together with his older brother Tamerlan, Dzhokhar Tsarnaev detonated two homemade bombs at the 2013 Boston Marathon, thus committing one of the worst domestic terrorist attacks since the 9/11 atrocities.1 Radical jihadists bent on killing Americans, the duo caused battlefield-like carnage.
    [Show full text]
  • Caucasus Emirates
    Caucasus Emirates The threats against the 2014 Winter Olympics put a spotlight on the Caucasus Emirates, a separatist Islamic extremist group in the Russian Federation loosely aligned with Al Qaeda. Although the Emirates’ purported primary aim is to create a state independent of Russia, its increased incorporation of extremist ideology and anti-Semitism into its mission heighten its inclination for acts of terrorism, while providing fodder for its growth. Founded in 2007 by Doku Umarov, former president of a self-proclaimed Chechen secessionist government, the Caucasus Emirates serves as an umbrella group for a number of smaller extremist and separatist organizations operating out of the Caucasus area, which includes Chechnya and Dagestan. Its stated goal is to create an independent Islamist theocracy in the Muslim-populated areas of Russia. The organization brought together a number of independent groups that had been fighting Russia for independence for decades, but whose leadership had been largely decimated by Russian forces. Although it was founded in 2007, the only emerged as a more active organization with a series of claimed attacks between 2009 and 2011. These attacks included a June 2009 sniper attack on the Dagestan Ministry of the Interior that resulted in three deaths; a September 2009 suicide bombing in Makhachkala, Dagestan that resulted in twelve deaths; the bombing of a train that resulted in 27 deaths and 100 injuries; a March 2010 bomb of the Moscow metro that resulted in 40 deaths and 100 injuries; an August 2010 attack by 60 militants 1 / 4 on a Chechen village that resulted in 6 deaths and 24 injuries; and a January 2011 bombing of the Domodedovo airport in Moscow that resulted in 37 deaths and 180 injuries.
    [Show full text]
  • Inferno in Chechnya: the Russian- Chechen Wars, the Al Qaeda Myth, and the Boston Marathon Bombings'
    H-War Akin on Williams, 'Inferno in Chechnya: The Russian- Chechen Wars, the Al Qaeda Myth, and the Boston Marathon Bombings' Review published on Thursday, August 6, 2020 Brian Glyn Williams. Inferno in Chechnya: The Russian-Chechen Wars, the Al Qaeda Myth, and the Boston Marathon Bombings. Lebanon: University Press of New England, 2015. 296 pp. $29.95 (cloth), ISBN 978-1-61168-737-8. Reviewed by Andrew Akin (Air University, eSchool of Graduate PME) Published on H-War (August, 2020) Commissioned by Margaret Sankey (Air University) Printable Version: http://www.h-net.org/reviews/showpdf.php?id=52197 Brian Glen Williams’s sweeping review of Chechen national identity and political history transports the reader from the April 2013 Boston Marathon finish line to the hamlets of the North Caucuses, the mountains of Afghanistan, and back to Boston. The book is deeply informative and largely accessible without prior knowledge of Russia, Central Asia, or the Caucuses. Readers move through the background of more than a thousand years of the inter-ethnic and cultural melding before being introduced to the modern Chechen culture and its traditions. The author then presents the history of brutal efforts by the Russian empire to claim and pacify the North Caucuses, contextualizing two centuries of conflict. The heart of this work focuses on the plight of Chechens in the last thirty years, from misplaced hope for a post-Soviet independent state to two bloody civil wars and the enduring mythology of the existence of disciplined, well-trained, radical jihadi Chechen fighters in every theater of the global war on terror.
    [Show full text]
  • Updated January 2016 Massachusetts Office for Victim Assistance Boston
    Massachusetts Office for Victim Assistance Boston Marathon Bombing Behavioral Health Program Master Service Agreement (MSA) Fact Sheet Completion of training in Cognitive Behavioral Therapy for Post Disaster Distress (CBT for PDD) is the first step to become eligible to provide services to victims of the Boston Marathon Bombing and receive reimbursement through the Massachusetts Office for Victim Assistance (MOVA). All those trained in CBT for PDD are then invited to apply to the Request for Response (RFR) to join MOVA’s Marathon Bombing Behavioral Health Program Master Service Agreement (MSA). This MSA is intended to link qualified clinicians and providers across the state of Massachusetts with Boston Marathon Bombing Victims. The MSA will allow these providers to seek reimbursement for approved behavioral health interventions to victims of the marathon bombing through the Antiterrorism Emergency Assistance Program (AEAP) grant. All those interested should see the RFR posted on COMMBUYS and MOVA’s website with instructions on how to apply. You can find the link to COMMBUYS and the posting on the AEAP section of MOVA’s website at the bottom of the page http://www.mass.gov/mova/grants/aeap/ Questions regarding this RFR should be submitted in writing via email to Amy Lindquist, Grants Program Specialist at [email protected] MOVA will review applications on a rolling basis starting February 2, 2016. MOVA anticipates approximately 30 days for processing and contracting. All applicants will be notified directly of incomplete applications. Additional information regarding the Master Services Agreement: The MSA will be restricted to serving victims as defined in MOVA’s AEAP Cooperative Agreement and the MSA will be time-limited to exhaustion of AEAP funding.
    [Show full text]
  • The Boston Marathon Bombing in the New York Times and Le Figaro
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 8-2014 News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro Ioana Alexandra Coman University of Tennessee - Knoxville, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the Communication Technology and New Media Commons, International and Intercultural Communication Commons, Journalism Studies Commons, and the Mass Communication Commons Recommended Citation Coman, Ioana Alexandra, "News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro. " PhD diss., University of Tennessee, 2014. https://trace.tennessee.edu/utk_graddiss/2812 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Ioana Alexandra Coman entitled "News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Communication and Information. Peter Gross, Major Professor We have read this dissertation and recommend its acceptance: Elizabeth Hendrickson, Suzie Allard, Michael Palenchar, Harry Dahms Accepted for the Council: Carolyn R.
    [Show full text]
  • Revisiting the Public Safety Exception to Miranda for Suspected Terrorists
    Journal of Criminal Law and Criminology Volume 107 | Issue 3 Article 3 Summer 2017 Revisiting the Public Safety Exception to Miranda for Suspected Terrorists: Dzhokhar Tsarnaev and the Bombing of the 2013 Boston Marathon Hannah Lonky Northwestern Pritzker School of Law Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminal Procedure Commons, Evidence Commons, and the Fourth Amendment Commons Recommended Citation Hannah Lonky, Revisiting the Public Safety Exception to Miranda for Suspected Terrorists: Dzhokhar Tsarnaev and the Bombing of the 2013 Boston Marathon, 107 J. Crim. L. & Criminology 393 (2017). https://scholarlycommons.law.northwestern.edu/jclc/vol107/iss3/3 This Comment is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 3. LONKY (JWM Final) (Corrected Page 393) 7/20/2017 12:24 PM 0091-4169/17/10703-0393 THE JOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 107, No. 3 Copyright © 2017 by Hannah Lonky Printed in U.S.A. REVISITING THE PUBLIC SAFETY EXCEPTION TO MIRANDA FOR SUSPECTED TERRORISTS: DZHOKHAR TSARNAEV AND THE BOMBING OF THE 2013 BOSTON MARATHON Hannah Lonky* This Comment examines the application of the public safety exception to Miranda to cases of domestic terrorism, looking particularly at the case of Dzhokhar Tsarnaev and the 2013 Boston Marathon bombing. By comparing the Department of Justice’s War on Terror policies to the Warren Court’s rationale for Miranda, this Comment argues that courts should require law enforcement officers to have reasonable knowledge of an immediate threat to public safety before they may properly invoke the Quarles public safety exception.
    [Show full text]
  • Baseball, Rituals, and the American Dream: an Analysis of the Boston
    Baseball, Rituals, and the American Dream: An Analysis of the Boston Red Sox’s Response to the Boston Marathon Bombing By © 2019 Benton James Bajorek BA, Arkansas State University, 2015 Submitted to the graduate degree program in Communication Studies and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Master of Arts. Chair: Dr. Beth Innocenti Dr. Scott Harris Dr. Robert Rowland Date Defended: 14 January 2019 ii The thesis committee for Benton James Bajorek certifies that this is the approved version of the following thesis: Baseball, Rituals, and the American Dream: An Analysis of the Boston Red Sox’s Response to the Boston Marathon Bombing Chair: Dr. Beth Innocenti Date Approved: 14 January 2019 iii Abstract In April 2013, the Tsarnaev brothers placed two homemade bombs near the finish line of the Boston Marathon. This attack created a need for healing the city’s spirit and the Boston Red Sox played an essential role in the city’s recovery as the team invited victims and first responders to pregame ceremonies throughout the season to participate in ritualistic pregame ceremonies. This thesis examines the Red Sox first home game after the bombing and argues that ritualistic pregame ceremonies craft conditions for performing national citizenship identity by calling upon mythic belief systems to warrant norms of citizenship performance. iv Acknowledgments I did not know what to expect from my first year of graduate school at the University of Kansas. Five years ago, I would never have dreamed of being in the position I’m currently in.
    [Show full text]
  • Celebrations and Challenges! WISHES CAME TRUE! – Church Secretary, Hired; Pastor for Youth and Families, Called; and a Whole New Annex Created!
    Clifton Presbyterian Church Celebrating Fifteen (15) Decades of Service and Gratitude 2000’s – 2010’s . Perhaps the Most Transformative Two Decades in American History! A New Millennium dawned, but the much feared Y2K bug failed to BITE! Yet . Bubbles Burst – Dot.com and later housing – and Disasters Struck . 9/11; Beltway Sniper; WMD’s; Iraq War; Katrina; Global Recession; Mass Shootings; the Boston Marathon Bombing, and . Politics Polarized –– Illegal Immigration; Gun Control; Affordable Care Act (ACA); Climate Change; Fracking . Social Norms Changed – Legalization of Marijuana; Same Sex Marriage; and LGBTQ Rights. Social Media Exploded – Facilitated Movements like Occupy Wall Street, Arab Spring, Black Lives Matter, and Me Too! – (You Tube Founded, 2005; Twitter Launched, 2006; and I Phone debuted in 2007). Innovations Awed – Driverless Vehicles; Drones; Artificial Intelligence; Quantum Computing; Crypto Currency; and DNA and Genetic Engineering. Presidential Elections Debated – Bush/Gore and Hanging Chads – the Electoral College vs. Popular Vote! President Obama, elected USA’s first black President, appointed the first Hispanic US Supreme Court Justice, Sonia Sotomayor! President Trump Impeached! And for CPC . Two decades of Celebrations and Challenges! WISHES CAME TRUE! – Church Secretary, hired; Pastor for Youth and Families, called; and a whole new annex created! . But all took patience, perseverance, and Prayer! CELEBRATIONS and CHALLENGES! A new millennium brought new growth to Clifton Presbyterian Church under the continued leadership of Pastor Lynn Stanton-Hoyle. Weddings still abounded – averaging 24 per year in the first 5 years of the decade. The average weekly attendance increased (130’s), so two Sunday services were held year round, and a 4th service was added on Christmas Eve.
    [Show full text]
  • Petition for a Writ of Certiorari to the United States Court of Appeals for the First Circuit
    No. In the Supreme Court of the United States UNITED STATES OF AMERICA, PETITIONER v. DZHOKHAR A. TSARNAEV ON PETITION FOR A WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FIRST CIRCUIT PETITION FOR A WRIT OF CERTIORARI JEFFREY B. WALL Acting Solicitor General Counsel of Record JOHN C. DEMERS Assistant Attorney General BRIAN C. RABBITT Acting Assistant Attorney General ERIC J. FEIGIN Deputy Solicitor General CHRISTOPHER G. MICHEL MICHAEL R. HUSTON Assistants to the Solicitor General WILLIAM A. GLASER JOSEPH F. PALMER Attorneys Department of Justice Washington, D.C. 20530-0001 [email protected] (202) 514-2217 QUESTIONS PRESENTED 1. Whether the court of appeals erred in concluding that respondent’s capital sentences must be vacated on the ground that the district court, during its 21-day voir dire, did not ask each prospective juror for a specific accounting of the pretrial media coverage that he or she had read, heard, or seen about respondent’s case. 2. Whether the district court committed reversible error at the penalty phase of respondent’s trial by ex- cluding evidence that respondent’s older brother was allegedly involved in different crimes two years before the offenses for which respondent was convicted. (I) RELATED PROCEEDINGS United States District Court (D. Mass.): United States v. Tsarnaev, No. 13-cr-10200 (Jan. 15, 2016) (amended judgment) United States Court of Appeals (1st Cir.): In re Tsarnaev, No. 14-2362 (Jan. 3, 2015) (denying first mandamus petition) In re Tsarnaev, No. 15-1170 (Feb. 27, 2015) (denying second mandamus petition) United States v.
    [Show full text]
  • The Boston Marathon and the Visa Negotiations Between the EU and Russia: Time to Get Real and Positive Michael Emerson 8 May 2013
    The Boston Marathon and the Visa Negotiations between the EU and Russia: Time to get real and positive Michael Emerson 8 May 2013 European interior ministries must be mulling over their reactions to the terrorist bombing of the Boston Marathon by the two young men of Chechen origin. In particular, they must have in mind their plan with Russia that aims at visa-free travel (‘visa liberalisation’) in the long-run, alongside shorter-term measures to reduce the hassle in getting visas (‘visa facilitation’). In our view, this overall plan is not optimal, and should be revised. The EU faces a dilemma here. On the one hand, visa-free travel would be not only good for business but also strategically the best instrument of policy to ‘socialise’ the Russian population. Let’s be clear, this soft word ‘socialise’ is all about easing the new generation of Russians into European attitudes towards societal and political values. This would be the foundation for the future politics and indeed geo-politics of Russia, whose leadership under President Putin is still indulging in somewhat xenophobic, paranoiac discourse, alongside an archaic foreign policy project to re- integrate former Soviet states into what would be called the Eurasian Union. Surveys of public opinion in Russia show this backward-looking worldview to be increasingly out of line with the preferences of the younger, educated Russian population, who seek a cosmopolitan life, and elites are sending their children to schools and universities in Europe on a grand scale. On the other hand, there are the security concerns of the European interior ministries.
    [Show full text]
  • Why Was Boston Strong? Lessons from the Boston Marathon Bombing
    Getty/McCollester WHY WAS BOSTON STRONG? LESSONS FROM THE BOSTON MARATHON BOMBING Herman B. “Dutch” Leonard Harvard Kennedy School & Harvard Business School Christine M. Cole Harvard Kennedy School PROGRAM ON CRISIS LEADERSHIP CRISIS PROGRAM ON Arnold M. Howitt Harvard Kennedy School Philip B. Heymann Harvard Law School This work is presented in memory and in honor of those who lost their lives or suffered grievous injuries in the Boston Marathon bombing. It is dedicated to all of those who helped. Why was Boston Strong? Why Was Boston Strong? Lessons from the Boston Marathon Bombing Herman B. “Dutch” Leonard Harvard Kennedy School and Harvard Business School Christine M. Cole Harvard Kennedy School Arnold M. Howitt Harvard Kennedy School Philip B. Heymann Harvard Law School April 2014 An earlier version of this white paper provided background for an expert dialogue on lessons learned from the events of the Boston Marathon bombing that was held at the John F. Kennedy School of Government at Harvard University, Cambridge, Massachusetts, March 13 and 14, 2014. © 2014 by the President and Fellows of Harvard College. Why was Boston Strong? Why was Boston Strong? Executive Summary On April 15, 2013, at 2:49 pm, an improvised explosive device (IED) detonated near the finish line of the Boston Marathon. Three people died, and more than 260 others needed hospital care, many having lost limbs or suffered horrific wounds. Those explosions began about 100 hours of intense drama that riveted the attention of the nation. The response by emergency
    [Show full text]
  • Countering Violent Extremism Programs
    Community Investment, Not Criminalization A Call to Abandon the Department of Homeland Security’s Violence Prevention Strategy By Harsha Panduranga PUBLISHED JUNE 17, 2021 Brennan Center for Justice at New York University School of Law Table of Contents Introduction............................................................................................................................................................................. 3 Countering Violent Extremism (CVE) Becomes the Center for Prevention Programs and Partnerships (CP3) ........... 4 Targeted Violence and Terrorism Are Different Threats..................................................................................................... 8 DHS’s Risk Factors and Indicators Do Not Help Identify Violent People and Undermine the Department’s Prevention Goal .................................................................................................................................................................... 13 DHS’s Risk Factors and Indicators Lack Empirical Support ........................................................................................... 13 DHS’s Risk Factors and Indicators Cannot Be Applied Consistently ............................................................................. 17 There Is No Evidence That DHS’s Violence Prevention Model Works in Practice ......................................................... 20 Labeling People as Threats Based on Unproven Signs Will Undermine DHS’s Violence Prevention Goal................... 22 DHS’s Violence
    [Show full text]