Widening the Lens on Content Moderation
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Free, Hateful, and Posted: Rethinking First Amendment Protection of Hate Speech in a Social Media World
Boston College Law Review Volume 60 Issue 7 Article 6 10-30-2019 Free, Hateful, and Posted: Rethinking First Amendment Protection of Hate Speech in a Social Media World Lauren E. Beausoleil Boston College Law School, [email protected] Follow this and additional works at: https://lawdigitalcommons.bc.edu/bclr Part of the First Amendment Commons, and the Internet Law Commons Recommended Citation Lauren E. Beausoleil, Free, Hateful, and Posted: Rethinking First Amendment Protection of Hate Speech in a Social Media World, 60 B.C.L. Rev. 2100 (2019), https://lawdigitalcommons.bc.edu/bclr/vol60/iss7/6 This Notes is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. FREE, HATEFUL, AND POSTED: RETHINKING FIRST AMENDMENT PROTECTION OF HATE SPEECH IN A SOCIAL MEDIA WORLD Abstract: Speech is meant to be heard, and social media allows for exaggeration of that fact by providing a powerful means of dissemination of speech while also dis- torting one’s perception of the reach and acceptance of that speech. Engagement in online “hate speech” can interact with the unique characteristics of the Internet to influence users’ psychological processing in ways that promote violence and rein- force hateful sentiments. Because hate speech does not squarely fall within any of the categories excluded from First Amendment protection, the United States’ stance on hate speech is unique in that it protects it. -
Download Download
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media (ICWSM 2021) A Large Open Dataset from the Parler Social Network Max Aliapoulios1, Emmi Bevensee2, Jeremy Blackburn3, Barry Bradlyn4, Emiliano De Cristofaro5, Gianluca Stringhini6, Savvas Zannettou7 1New York University, 2SMAT, 3Binghamton University, 4University of Illinois at Urbana-Champaign, 5University College London, 6Boston University, 7Max Planck Institute for Informatics [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract feasible in technical terms to create a new social media plat- Parler is as an “alternative” social network promoting itself form, but marketing the platform towards specific polarized as a service that allows to “speak freely and express yourself communities is an extremely successful strategy to bootstrap openly, without fear of being deplatformed for your views.” a user base. In other words, there is a subset of users on Twit- Because of this promise, the platform become popular among ter, Facebook, Reddit, etc., that will happily migrate to a new users who were suspended on mainstream social networks platform, especially if it advertises moderation policies that for violating their terms of service, as well as those fearing do not restrict the growth and spread of political polariza- censorship. In particular, the service was endorsed by several tion, conspiracy theories, extremist ideology, hateful and vi- conservative public figures, encouraging people to migrate olent speech, and mis- and dis-information. from traditional social networks. After the storming of the US Capitol on January 6, 2021, Parler has been progressively de- Parler. -
Audit of Antisemitic Incidents 2019
Audit of Antisemitic Incidents 2019 Sections 1 Executive Summary 4 Methodology 2 Major Findings 5 Policy Recommendations 3 Themes and Trends 6 Take Action 7 Acknowledgements 1 / 29 1 of 6 EXECUTIVE SUMMARY Each year, ADL’s (Anti-Defamation League) Center on Extremism tracks incidents of antisemitic harassment, vandalism and assault in the United States. Since 1979, we have published this information in an annual Audit of Antisemitic Incidents. In 2019, ADL tabulated 2,107 antisemitic incidents throughout the United States. This is a 12% increase from the 1,879 incidents recorded in 2018 and marks the highest number on record since ADL began tracking antisemitic incidents in 1979. Of the 2,107 incidents recorded in 2019, 1,127 were cases of harassment, a 6% increase from 1,066 in 2018, and 919 were cases of vandalism, a 19% increase from 774 in 2018. The 61 incidents of antisemitic assault (a 56% increase from 2 / 29 39 in 2018), involved 95 victims and led to five deaths. More than half of the assaults nationwide took place in the five boroughs of New York City. There were three major attacks on the Jewish community in 2019: A white supremacist opened fire at the Chabad of Poway, California, on April 27, killing one. Two individuals, at least one of whom was associated with an antisemitic Black Hebrew Israelite sect, attacked a Jewish grocery store in Jersey City, New Jersey, on December 10, killing three. On December 28 an individual attacked a Hanukkah party at the home of a rabbi in Monsey, New York, with a knife, resulting in four injuries and one fatality. -
The Radical Roots of the Alt-Right
Gale Primary Sources Start at the source. The Radical Roots of the Alt-Right Josh Vandiver Ball State University Various source media, Political Extremism and Radicalism in the Twentieth Century EMPOWER™ RESEARCH The radical political movement known as the Alt-Right Revolution, and Evolian Traditionalism – for an is, without question, a twenty-first century American audience. phenomenon.1 As the hipster-esque ‘alt’ prefix 3. A refined and intensified gender politics, a suggests, the movement aspires to offer a youthful form of ‘ultra-masculinism.’ alternative to conservatism or the Establishment Right, a clean break and a fresh start for the new century and .2 the Millennial and ‘Z’ generations While the first has long been a feature of American political life (albeit a highly marginal one), and the second has been paralleled elsewhere on the Unlike earlier radical right movements, the Alt-Right transnational right, together the three make for an operates natively within the political medium of late unusual fusion. modernity – cyberspace – because it emerged within that medium and has been continuously shaped by its ongoing development. This operational innovation will Seminal Alt-Right figures, such as Andrew Anglin,4 continue to have far-reaching and unpredictable Richard Spencer,5 and Greg Johnson,6 have been active effects, but researchers should take care to precisely for less than a decade. While none has continuously delineate the Alt-Right’s broader uniqueness. designated the movement as ‘Alt-Right’ (including Investigating the Alt-Right’s incipient ideology – the Spencer, who coined the term), each has consistently ferment of political discourses, images, and ideas with returned to it as demarcating the ideological territory which it seeks to define itself – one finds numerous they share. -
Nonprofit Security Grant Program Threat Incident Report
Nonprofit Security Grant Program Threat Incident Report: January 2019 to Present November 15, 2020 (Updated 02/22/2021) Prepared By: Rob Goldberg, Senior Director, Legislative Affairs [email protected] The following is a compilation of recent threat incidents, at home or abroad, targeting Jews and Jewish institutions (and other faith-based organization) that have been reported in the public record. When completing the Threat section of the IJ (Part III. Risk): ▪ First Choice: Describe specific terror (or violent homegrown extremist) incidents, threats, hate crimes, and/or related vandalism, trespass, intimidation, or destruction of property that have targeted its property, membership, or personnel. This may also include a specific event or circumstance that impacted an affiliate or member of the organization’s system or network. ▪ Second Choice: Report on known incidents/threats that have occurred in the community and/or State where the organization is located. ▪ Third Choice: Reference the public record regarding incidents/threats against similar or like institutions at home or abroad. Since there is limited working space in the IJ, the sub-applicant should be selective in choosing appropriate examples to incorporate into the response: events that are most recent, geographically proximate, and closely related to their type or circumstance of their organization or are of such magnitude or breadth that they create a significant existential threat to the Jewish community at large. I. Overview of Recent Federal Risk Assessments of National Significance Summary The following assessments underscore the persistent threat of lethal violence and hate crimes against the Jewish community and other faith- and community-based institutions in the United States. -
Riots: a Comparative Study of Twitter and Parler
111 Capitol (Pat)riots: A comparative study of Twitter and Parler HITKUL, IIIT - Delhi, India AVINASH PRABHU∗, DIPANWITA GUHATHAKURTA∗, JIVITESH JAIN∗, MALLIKA SUBRA- MANIAN∗, MANVITH REDDY∗, SHRADHA SEHGAL∗, and TANVI KARANDIKAR∗, IIIT - Hy- derabad, India AMOGH GULATI∗ and UDIT ARORA∗, IIIT - Delhi, India RAJIV RATN SHAH, IIIT - Delhi, India PONNURANGAM KUMARAGURU, IIIT - Delhi, India On 6 January 2021, a mob of right-wing conservatives stormed the USA Capitol Hill interrupting the session of congress certifying 2020 Presidential election results. Immediately after the start of the event, posts related to the riots started to trend on social media. A social media platform which stood out was a free speech endorsing social media platform Parler; it is being claimed as the platform on which the riots were planned and talked about. Our report presents a contrast between the trending content on Parler and Twitter around the time of riots. We collected data from both platforms based on the trending hashtags and draw comparisons based on what are the topics being talked about, who are the people active on the platforms and how organic is the content generated on the two platforms. While the content trending on Twitter had strong resentments towards the event and called for action against rioters and inciters, Parler content had a strong conservative narrative echoing the ideas of voter fraud similar to the attacking mob. We also find a disproportionately high manipulation of traffic on Parler when compared to Twitter. Additional Key Words and Phrases: Social Computing, Data Mining, Social Media Analysis, Capitol Riots, Parler, Twitter 1 INTRODUCTION Misinformation of the United States of America’s presidential election results being fraudulent has been spreading across the world since the elections in November 2020.1 Public protests and legal cases were taking place across the states against the allegation of voter fraud and manhandling of mail-in ballots.2 This movement took a violent height when a mob attacked the Capitol Hill building to stop certification of Mr. -
Building Resilience & Confronting Risk In
BUILDING RESILIENCE & CONFRONTING RISK IN THE COVID-19 ERA A PARENTS & CAREGIVERS GUIDE TO ONLINE RADICALIZATION POLARIZATION AND EXTREMISM RESEARCH AND INNOVATION LAB (PERIL) PERIL brings the resources and expertise of the university sector to bear CONTENTS on the problem of growing youth polarization and extremist radicalization, through scalable research, intervention, and public education ideas to PARENT & CAREGIVER GUIDE 3 reduce rising polarization and hate. WHAT IS ONLINE RADICALIZATION? WHY SHOULD YOU CARE? 4 SOUTHERN POVERTY LAW CENTER NEW RISKS IN THE COVID-19 ERA 5 The SPLC seeks to be a catalyst for racial justice in the South and RECOGNIZING WARNING SIGNS 6 beyond, working in partnership with communities to dismantle white UNDERSTANDING THE DRIVERS 7 supremacy, strengthen intersectional movements, and advance the ENGAGE AND EMPOWER 9 human rights of all people. RESPONDING TO HATE 11 HOW TO GET HELP 12 APPENDIX: STAYING ALERT TO SITES, PLATFORMS AND APPS FREQUENTLY EXPLOITED BY EXTREMISTS 17 ENDNOTES 19 CREDITS 20 ILLUSTRATIONS BY CLAUDIA WHITAKER PARENT & CAREGIVER GUIDE Who is this guide for? We wrote this guide with a wide Whether you live with a young person, or work virtually range of caregivers in mind. with youth, radicalization to extremism is something we all should be concerned about. Extremists looking Caregivers living with children and young adults. This to recruit and convert children are predatory. Like all includes parents, grandparents, foster parents, extended forms of child exploitation, extremist recruitment drives families, and residential counselors who are the a wedge between young people and the adults they would guardians and caregivers of children and youth living typically trust. -
S.C.R.A.M. Gazette
MARCH EDITION Chief of Police Dennis J. Mc Enerney 2017—Volume 4, Issue 3 S.c.r.a.m. gazette FBI, Sheriff's Office warn of scam artists who take aim at lonely hearts DOWNTOWN — The FBI is warning of and report that they have sent thousands of "romance scams" that can cost victims dollars to someone they met online,” Croon thousands of dollars for Valentine's Day said. “And [they] have never even met that weekend. person, thinking they were in a relationship with that person.” A romance scam typically starts on a dating or social media website, said FBI spokesman If you meet someone online and it seems "too Garrett Croon. A victim will talk to someone good to be true" and every effort you make to online for weeks or months and develop a meet that person fails, "watch out," Croon relationship with them, and the other per- Croon said. warned. Scammers might send photos from son sometimes even sends gifts like flowers. magazines and claim the photo is of them, say Victims can be bilked for hundreds or thou- they're in love with the victim or claim to be The victim and the other person are never sands of dollars this way, and Croon said the unable to meet because they're a U.S. citizen able to meet, with the scammer saying they most common victims are women who are 40 who is traveling or working out of the coun- live or work out of the country or canceling -60 years old who might be widowed, di- try, Croon said. -
The Alt-Right on Campus: What Students Need to Know
THE ALT-RIGHT ON CAMPUS: WHAT STUDENTS NEED TO KNOW About the Southern Poverty Law Center The Southern Poverty Law Center is dedicated to fighting hate and bigotry and to seeking justice for the most vulnerable members of our society. Using litigation, education, and other forms of advocacy, the SPLC works toward the day when the ideals of equal justice and equal oportunity will become a reality. • • • For more information about the southern poverty law center or to obtain additional copies of this guidebook, contact [email protected] or visit www.splconcampus.org @splcenter facebook/SPLCenter facebook/SPLConcampus © 2017 Southern Poverty Law Center THE ALT-RIGHT ON CAMPUS: WHAT STUDENTS NEED TO KNOW RICHARD SPENCER IS A LEADING ALT-RIGHT SPEAKER. The Alt-Right and Extremism on Campus ocratic ideals. They claim that “white identity” is under attack by multicultural forces using “politi- An old and familiar poison is being spread on col- cal correctness” and “social justice” to undermine lege campuses these days: the idea that America white people and “their” civilization. Character- should be a country for white people. ized by heavy use of social media and memes, they Under the banner of the Alternative Right – or eschew establishment conservatism and promote “alt-right” – extremist speakers are touring colleges the goal of a white ethnostate, or homeland. and universities across the country to recruit stu- As student activists, you can counter this movement. dents to their brand of bigotry, often igniting pro- In this brochure, the Southern Poverty Law Cen- tests and making national headlines. Their appear- ances have inspired a fierce debate over free speech ter examines the alt-right, profiles its key figures and the direction of the country. -
Understanding the Qanon Conspiracy from the Perspective of Canonical Information
The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information Max Aliapoulios*;y, Antonis Papasavva∗;z, Cameron Ballardy, Emiliano De Cristofaroz, Gianluca Stringhini, Savvas Zannettou◦, and Jeremy Blackburn∓ yNew York University, zUniversity College London, Boston University, ◦Max Planck Institute for Informatics, ∓Binghamton University [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] — iDRAMA, https://idrama.science — Abstract administration of a vaccine [54]. Some of these theories can threaten democracy itself [46, 50]; e.g., Pizzagate emerged The QAnon conspiracy theory claims that a cabal of (literally) during the 2016 US Presidential elections and claimed that blood-thirsty politicians and media personalities are engaged Hillary Clinton was involved in a pedophile ring [51]. in a war to destroy society. By interpreting cryptic “drops” of A specific example of the negative consequences social me- information from an anonymous insider calling themself Q, dia can have is the QAnon conspiracy theory. It originated on adherents of the conspiracy theory believe that Donald Trump the Politically Incorrect Board (/pol/) of the anonymous im- is leading them in an active fight against this cabal. QAnon ageboard 4chan via a series of posts from a user going by the has been covered extensively by the media, as its adherents nickname Q. Claiming to be a US government official, Q de- have been involved in multiple violent acts, including the Jan- scribed a vast conspiracy of actors who have infiltrated the US uary 6th, 2021 seditious storming of the US Capitol building. -
Understanding Web Archiving Services and Their (Mis) Use On
Understanding Web Archiving Services and Their (Mis)Use on Social Media∗ Savvas Zannettou?, Jeremy Blackburnz, Emiliano De Cristofaroy, Michael Sirivianos?, Gianluca Stringhiniy ?Cyprus University of Technology, yUniversity College London, zUniversity of Alabama at Birmingham [email protected], [email protected], fe.decristofaro,[email protected], [email protected] Abstract In this context, an important role is played by services like the Wayback Machine (archive.org), which proactively Web archiving services play an increasingly important role archives large portions of the Web, allowing users to search in today’s information ecosystem, by ensuring the continuing and retrieve the history of more than 300 billion pages. At the availability of information, or by deliberately caching content same time, on-demand archiving services like archive.is have that might get deleted or removed. Among these, the Way- also become popular: users can take a snapshot of a Web page back Machine has been proactively archiving, since 2001, ver- by entering its URL, which the system crawls and archives, re- sions of a large number of Web pages, while newer services turning a permanent short URL serving as a time capsule that like archive.is allow users to create on-demand snapshots of can be shared across the Web. specific Web pages, which serve as time capsules that can be shared across the Web. In this paper, we present a large-scale Archiving services serve a variety of purposes beyond ad- analysis of Web archiving services and their use on social me- dressing link rot. Platforms like archive.is are reportedly used dia, shedding light on the actors involved in this ecosystem, to preserve controversial blogs and tweets that the author may the content that gets archived, and how it is shared. -
Implicit Structure and the Dynamics of Blogspace
Implicit Structure and the Dynamics of Blogspace Eytan Adar Li Zhang Lada A. Adamic Rajan M. Lukose HP Information Dynamics Lab Abstract applications for finding the latest information very little attention has been paid to its spread. Weblogs link together in a complex structure through which new ideas and discourse can flow. Such a structure is ideal for In this paper, we study the pattern and dynamics of information the study of the propagation of information. In this paper we spreading in blogspace. We consider both the large scale describe general categories of information epidemics and create aspects of spreading patterns as well as how a specific, a tool to infer and visualize the paths specific infections take individual link may be tracked in blog networks. Our study is through the network. This inference is based in part on a novel enabled by the blog data that is crawled on a daily basis. In our utilization of data describing historical, repeating patterns of study, we will only track link information. While memes can infection. We conclude with a description of a new ranking take many forms, those addressed by URLs are by far the algorithm, iRank, for blogs. In contrast to traditional ranking simplest to track and disambiguate. For example, our system strategies, iRank acts on the implicit link structure to find those will track http://www.giantmicrobes.com instead of discussions blogs that initiate these epidemics. about the Giant Microbe toys, or images copied from the source site. General Terms With the triplets of (URL, blog, day of URL citation), we first Measurement, Experimentation, Algorithm characterize the spreading patterns of information.