Policy Brief

Total Page:16

File Type:pdf, Size:1020Kb

Policy Brief Policy brief Why Misery Loves Company: The Rise of Conspiracyæ Theories and Violent Extremism Issue 2020/07 • November 2020 By Raul Rios The aim of this policy brief is to provide an Introduction overview of some key research recently published examining conspiracy theories QAnon, the great replacement, chemtrails and and their possible links to violence, 5G causing Coronavirus, are among some of particularly violent extremism. The research the recent conspiracy theories which have cited is meant as a starting point for become increasingly associated with extremist policymakers and decision-makers (yet groups (specifically far-right extremist). Of without claiming to be fully exhaustive). growing concern among authorities, is that the Second, this policy brief seeks to highlight subscribers of the latter and other conspiracy some of the key trends and dynamics theories may be at risk of becoming radicalised between conspiracy theories and the acts of violence associated with them, or in some instances compelled to carry out by looking at how one may influence acts of violence as a result of narratives and the other. The policy brief concludes by belief peddled by them. In the recent past, suggesting a series of recommendations these horrible acts have included those such for policymakers and decision-makers to as the Pittsburgh synagogue shooting in consider when developing new policies Pennsylvania, where the perpetrator believed to tackle extremist groups which have in a white genocide conspiracy theory (Lind, integrated conspiracy theories promoting 2018), or the Hanau terrorist attack where the violence into their milieus or narratives. attacker was a subscriber of several different conspiracy theorists blog posts (Emberland, 2020). In this regard, Gilles de Kerchove, the EU Counter-Terrorism Coordinator, expressed in an Conspiracy? An Act Versus a Theory interview with the West Point Sentinel on August 2020 that “the potential future rise of new forms Misinformation, obfuscation of the facts and of terrorism, rooted in conspiracy theories and ever-shifting narratives, are commonplace technophobia, is a cause for concern” (quoted when dealing with conspiracy theories and their in Pantucci, 2020). Throughout the last decade, subscribers. Therefore, it is important to clarify researchers across several fields, policymakers the difference between an act of conspiracy and decisionmakers have started to take versus a conspiracy theory. First off, legal conspiracy theories and the role they play in definitions as to what exactly constitutes a inciting and fuelling violence, including acts criminal act of conspiracy vary according to of violent extremism and terrorism much more civil and common law regimes and on a state seriously. by state basis. Criminal laws concerning acts of conspiracy tend to exist in most countries in Policy brief • n° 2020/07 Europe as well as the United States (Stenson, Building Blocks of a Conspiracy Theory 2006.). The main legal elements key to a crime At the very minimum, all conspiracy theories of conspiracy, are the actus reus (guilty act; share three key components. The first is the required in most jurisdictions to prosecute) and existence of a secret plot or covert action, which mens rea (guilty mind) (UNDOC, 2018). In its has taken place either at the regional, national most basic legal definition, an act of conspiracy or global level. The second component is a consists of two or more individuals who plot to group of conspirators portrayed as powerful. commit a criminal act and then carry out the act. They are often identified as belonging to the However, throughout the literature additional opposition and are at the helm of the conspiracy. elements are often included in the definitions The third key component found in conspiracy of what constitutes a conspiracy. Elements theories is a particular group who are used as such as, the power status of the conspirators scapegoats, blaming them for all that is wrong or group (political or social), their ability and within their societies (i.e. Jews, Muslims, capacity to execute the conspiracy, and how Romani, intellectuals, LGBTQI, etc). While, these widespread and far-reaching the conspiracy three points form the foundation of mostly all are. For example, Douglas et al. (2019) define conspiracy theories and are key to identifying a conspiracy as a “secret plot by two or more them, they might also share other components. powerful actors” (citing Keeley, 1999 and Pigden, In their research, van Prooijen and van Vugt 1995). Whereas Uscinski et al. (2016), define a (2018) point out five components of conspiracy conspiracy as a “secret arrangement between theories; deliberateness, secrecy, coalition, a small group of actors to usurp political or threat and pattern. Conspiracy theories, also economic power, violate established rights, tend to have a Manichean or dualistic world view hide vital secrets, or illicitly cause widespread where there exist a good vs. evil, or a them vs. us harm”. As for the definition of a conspiracy component (Oliver and Wood, 2014). Yet, another theory, Oxford dictionary defines it as “a belief important aspect is that conspiracy theories that some covert but influential organization tend to be “self-sealing” and extremely “resistant is responsible for an unexplained event”. In to correction” (Sunstein and Vermeule, 2008). the academic literature, the definition of a In the case of newer conspiracy theories conspiracy theory tends to vary to some extent particularly QAnon, they are not only seemingly and often include specifically defined concepts resistant to correction and self-sealing but or elements. Douglas et al. (2019) define a are able to adapt and evolve to new counter- conspiracy theory as “attempts to explain narratives or contradictory information. Indeed, the ultimate causes of significant social and QAnon has increasingly begun integrating political events and circumstances with claims aspects of other theories, such as 5G and of secret plots by two or more powerful actors.” Coronavirus, anti-vaccination theories and more Similarly, Sunstein and Vermeule (2008), also recently #SaveOurChildren. A conglomeration include in their definition of conspiracy theory of several theories continues to appeal to their a group of “powerful people”. Another common subscriber base (Doward, 2020). Interestingly, component found in definitions of conspiracy the fact that QAnon subscribers believe in theories is their degree of harmfulness or multiple unrelated conspiracy theories at once, malevolence (Oliver and Wood, 2014). it is not necessarily an uncommon phenomenon 2 Policy brief • n° 2020/07 (see Wood, Douglas, & Sutton, 2012). Moreover, as reddit (see Scrivens, Davies, Frank, 2020) or A recent survey examining the relationship voat.co (see Blackburn et al., 2020) have also between QAnon and conspiracy beliefs in the helped to propagate conspiracy theories at an US showed that only a small percentage of alarming rate. Somewhat concerning is the QAnon subscribers believed in all the theories fact that in one survey 7% of the respondents associated with QAnon (Schaffner 2020). But (n=4,057) thought that QAnon (which is a of some concern among researcher, is that the conspiracy theory itself) was a trustable source latter form of conspiracy integration found in of information, whereas a sixth of respondents QAnon could be novel and might be indicative of surveyed said they “trust QAnon at least some QAnon subscribers moving towards creating a of the time” (Schaffner 2020). form of both online and offline collective identity But why do individuals decide to subscribe to (see Gaudette et al., 2020). The components conspiracy theories? Multidisciplinary research outlined above are among the most highlighted examining what drives individuals (mainly throughout the literature. This is not meant to in the United States and Europe) to believe in be an exhaustive list of components. conspiracy theories has been increasingly carried out in the last decade. The research Subscribing to Conspiracy Theories indicates that individuals who are the most While international actors such as UNESCO susceptible to conspiracy theories include (2020) and the European Commission (2020), those with a basic level of education (associated have launched campaigns in order to counter with “cognitive complexity” see van Prooijen, misinformation arising from conspiracy theories 2017), individuals who are socially marginalized and alert citizens on key issues, many still fall prey or isolated, who feel unsure about their job to conspiracy theories. Vital to understanding security (van Prooijen and Douglas, 2017), those the dynamics which exist between conspiracy with low income levels, and those who agree theories and violent extremism is understanding that violence is a legitimate means of solving which demographics are the most susceptible social or political problems (Drochon 2018, to the narratives espoused by them. Indeed, citing Uckinksi and Parent 2014). In addition, conspiracy theories have increasingly found a the type of democratic political system (i.e. following among certain populations in both direct democracy versus representative) seems Europe and the United States. In Germany, to have no direct impact or influence among a recent survey found that about a third of conspiracy subscribers, who tend to already respondents believed that a secret cabal is heavily suspect or reject their political system running the world (Deutsche Welle, 2020).
Recommended publications
  • The Public Life of Secrets: Deception, Disclosure, and Discursive Framing in the Policy Process
    STXXXX10.1177/0735275115587388Sociological TheoryBail 587388research-article2015 Original Article Sociological Theory 2015, Vol. 33(2) 97 –124 The Public Life of Secrets: © American Sociological Association 2015 DOI: 10.1177/0735275115587388 Deception, Disclosure, and stx.sagepub.com Discursive Framing in the Policy Process Christopher A. Bail1 Abstract While secrecy enables policy makers to escape public scrutiny, leaks of classified information reveal the social construction of reality by the state. I develop a theory that explains how leaks shape the discursive frames states create to communicate the causes of social problems to the public and corresponding solutions to redress them. Synthesizing cultural sociology, symbolic interactionism, and ethnomethodology, I argue that leaks enable non– state actors to amplify contradictions between the public and secret behavior of the state. States respond by “ad hoc–ing” new frames that normalize their secret transgressions as logical extensions of other policy agendas. While these syncretic responses resolve contradictions exposed by leaks, they gradually detach discursive frames from reality and therefore increase states’ need for secrecy—as well as the probability of future leaks—in turn. I illustrate this downward spiral of deception and disclosure via a case study of the British government’s discourse about terrorism between 2000 and 2008. Keywords cultural sociology, political sociology, secrecy, symbolic interactionism, comparative- historical sociology “For in the order of things it is found that one never seeks to avoid one inconvenience without running into another.” —Machiavelli (The Prince, chapter 21) A vast literature explains how policy makers shape public understandings of social problems in order to accomplish their agenda (e.g., Alexander and Smith 1993; Berezin 1997; Jacobs and Sobieraj 2007; Reed 2013; Skrentny 2004; Somers and Block 2005; Spillman 1997; Steensland 2007; Wagner-Pacifici 1994).
    [Show full text]
  • Download Download
    Proceedings of the Fifteenth International AAAI Conference on Web and Social Media (ICWSM 2021) A Large Open Dataset from the Parler Social Network Max Aliapoulios1, Emmi Bevensee2, Jeremy Blackburn3, Barry Bradlyn4, Emiliano De Cristofaro5, Gianluca Stringhini6, Savvas Zannettou7 1New York University, 2SMAT, 3Binghamton University, 4University of Illinois at Urbana-Champaign, 5University College London, 6Boston University, 7Max Planck Institute for Informatics [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract feasible in technical terms to create a new social media plat- Parler is as an “alternative” social network promoting itself form, but marketing the platform towards specific polarized as a service that allows to “speak freely and express yourself communities is an extremely successful strategy to bootstrap openly, without fear of being deplatformed for your views.” a user base. In other words, there is a subset of users on Twit- Because of this promise, the platform become popular among ter, Facebook, Reddit, etc., that will happily migrate to a new users who were suspended on mainstream social networks platform, especially if it advertises moderation policies that for violating their terms of service, as well as those fearing do not restrict the growth and spread of political polariza- censorship. In particular, the service was endorsed by several tion, conspiracy theories, extremist ideology, hateful and vi- conservative public figures, encouraging people to migrate olent speech, and mis- and dis-information. from traditional social networks. After the storming of the US Capitol on January 6, 2021, Parler has been progressively de- Parler.
    [Show full text]
  • Writing About Espionage Secrets
    Secrecy and Society ISSN: 2377-6188 Volume 2 Number 1 Secrecy and Intelligence Article 7 September 2018 Writing About Espionage Secrets Kristie Macrakis Georgia Tech, Atlanta, [email protected] Follow this and additional works at: https://scholarworks.sjsu.edu/secrecyandsociety Part of the History of Science, Technology, and Medicine Commons, and the Other History Commons Recommended Citation Macrakis, Kristie. 2018. "Writing About Espionage Secrets." Secrecy and Society 2(1). https://doi.org/10.31979/2377-6188.2018.020107 https://scholarworks.sjsu.edu/ secrecyandsociety/vol2/iss1/7 This Special Issue Article is brought to you for free and open access by the School of Information at SJSU ScholarWorks. It has been accepted for inclusion in Secrecy and Society by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Writing About Espionage Secrets Abstract This article describes the author’s experiences researching three books on espionage history in three different countries and on three different topics. The article describes the foreign intelligence arm of the Ministry for State Security; a global history of secret writing from ancient to modern times; and finally, my current project on U.S. intelligence and technology from the Cold War to the War on Terror. The article also discusses the tensions between national security and openness and reflects on the results of this research and its implications for history and for national security. Keywords Central Intelligence Agency, CIA,
    [Show full text]
  • What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
    What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter.
    [Show full text]
  • National Security Secrecy: How the Limits Change
    Steven Aftergood National Security Secrecy: How the Limits Change as a nation, we seem to be of two minds about secrecy. we know that government secrecy is incompatible with democratic decision-making in obvious ways. By definition, secrecy limits access to official information, thereby impeding public participation in the deliberative process and inhibiting or preventing the accountability of government officials for their actions. Yet there is a near universal consensus that some measure of secrecy is justified and necessary to protect authorized national security activities, such as intelligence gathering and military operations, to permit confidential deliberations in the course of policy development, to secure personal privacy, and for other reasons. Reconciling these conflicting interests is an ongoing challenge. A stable secrecy policy is hard to achieve since the proper boundaries of offi- cial secrecy cannot be clearly articulated in the abstract and tend to shift over time. In practice, decisions to restrict information seem to depend on prevailing security considerations (secrecy is more pronounced in time of war), official predispositions (some political leaders favor secrecy more than others), and public attitudes and expectations. In recent years, a large and growing number of public interest organizations and professional societies have turned their attention to government secrecy, identifying it as an obstacle to achieving their own objectives. In fact, there are at least two entire coalitions of organiza- tions devoted to combating secrecy: Openthegovernment.org and the Research for this paper was supported by grants from the Foundation to Promote Open Society, the HKH Foundation, the CS Fund, the Stewart R. Mott Foundation, and the Rockefeller Family Fund.
    [Show full text]
  • It's About Ethics in Games Journalism? Gamergaters and Geek
    SMSXXX10.1177/2056305116672484Social Media + SocietyBraithwaite 672484research-article2016 SI: Making Digital Cultures Social Media + Society October-December 2016: 1 –10 It’s About Ethics in Games Journalism? © The Author(s) 2016 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav Gamergaters and Geek Masculinity DOI: 10.1177/2056305116672484 sms.sagepub.com Andrea Braithwaite Abstract #Gamergate is an online movement ostensibly dedicated to reforming ethics in video games journalism. In practice, it is characterized by viciously sexual and sexist attacks on women in and around gaming communities. #Gamergate is also a site for articulating “Gamergater” as a form of geek masculinity. #Gamergate discussions across social media platforms illustrate how Gamergaters produce and reproduce this gendered identity. Gamergaters perceive themselves as crusaders, under siege from critics they pejoratively refer to as SJWs (social justice warriors). By leveraging social media for concern-trolling about gaming as an innocuous masculine pastime, Gamergaters situate the heterosexual White male as both the typical gamer and the real victim of #Gamergate. #Gamergate is a specific and virulent online node in broader discussions of privilege, difference, and identity politics. Gamergaters are an instructive example of how social media operate as vectors for public discourses about gender, sexual identity, and equality, as well as safe spaces for aggressive and violent misogyny. Keywords Gamergate, gaming cultures, geek masculinity, online harassment, social media At the end of August 2014, many online gaming communities situate themselves as the “real” victims, oppressed by calls erupted into vicious arguments—ostensibly about ethics in for diversity and at risk of losing “their” games to more video game journalism, but more pointedly about gender, inclusive ones.
    [Show full text]
  • Understanding the Qanon Conspiracy from the Perspective of Canonical Information
    The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information Max Aliapoulios*;y, Antonis Papasavva∗;z, Cameron Ballardy, Emiliano De Cristofaroz, Gianluca Stringhini, Savvas Zannettou◦, and Jeremy Blackburn∓ yNew York University, zUniversity College London, Boston University, ◦Max Planck Institute for Informatics, ∓Binghamton University [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] — iDRAMA, https://idrama.science — Abstract administration of a vaccine [54]. Some of these theories can threaten democracy itself [46, 50]; e.g., Pizzagate emerged The QAnon conspiracy theory claims that a cabal of (literally) during the 2016 US Presidential elections and claimed that blood-thirsty politicians and media personalities are engaged Hillary Clinton was involved in a pedophile ring [51]. in a war to destroy society. By interpreting cryptic “drops” of A specific example of the negative consequences social me- information from an anonymous insider calling themself Q, dia can have is the QAnon conspiracy theory. It originated on adherents of the conspiracy theory believe that Donald Trump the Politically Incorrect Board (/pol/) of the anonymous im- is leading them in an active fight against this cabal. QAnon ageboard 4chan via a series of posts from a user going by the has been covered extensively by the media, as its adherents nickname Q. Claiming to be a US government official, Q de- have been involved in multiple violent acts, including the Jan- scribed a vast conspiracy of actors who have infiltrated the US uary 6th, 2021 seditious storming of the US Capitol building.
    [Show full text]
  • INTERVENTION of STATE SOVEREIGNTY THROUGH RELEASING STATE SECRECY by WIKILEAKS Engla Puspita Haria, S.H.,M.H
    INTERVENTION OF STATE SOVEREIGNTY THROUGH RELEASING STATE SECRECY BY WIKILEAKS Engla Puspita Haria, S.H.,M.H. ABSTRACT The increasing number of disclosure of state secrecy in this age create by Wikileaks make the impact for state sovereignty such as stability of state, disturb the relationship between the state, dysfunction of government and political and economic instance. This number happened because of some factors:1) insufficiency of sophisticated technological support provided by related state, advancement and introducing new technology, collision between staff members. corruptions, and international criminal syndicated:2)the inconstancy law regulated the criminal act about secrecy state;3)technological advances while the human resources that are not reliable. But in other hand, people have right to know and it remarkable in Declaration of Human Right article 19 But there is no regulation at national and international level for Wikileaks. In this research, the study will investigate two problems: 1) what the impact for state sovereignty because of disclosure state secrecy; and 2) what is the legal action to protect state secrecy and study will find the problem of this research and create some offered solution and use the ultimate value in of all part the research with use the existence of legal theory, legal practice, norm or regulations, legal fact and indicated the conflict either. So this research will use normative type of research. In fact, in this research, study has analyze the case of Wikileaks and found that wikileaks already disclosure the data that very important for state sovereignty. Most of their documents are from the people who steal from diplomatic cable of state.
    [Show full text]
  • Understanding Self-Deception Through Theory, Evidence and Application
    Secrecy and Society ISSN: 2377-6188 Volume 2 Number 2 Teaching Secrecy Article 2 January 2021 Keeping Secrets from Ourselves: Understanding Self-deception Through Theory, Evidence and Application Mathew J. Creighton University College Dublin, Ireland, [email protected] Follow this and additional works at: https://scholarworks.sjsu.edu/secrecyandsociety Part of the Other Sociology Commons Recommended Citation Creighton, Mathew J.. 2021. "Keeping Secrets from Ourselves: Understanding Self- deception Through Theory, Evidence and Application." Secrecy and Society 2(2). https://doi.org/10.31979/2377-6188.2021.020202 https://scholarworks.sjsu.edu/ secrecyandsociety/vol2/iss2/2 This Special Issue Article is brought to you for free and open access by the School of Information at SJSU ScholarWorks. It has been accepted for inclusion in Secrecy and Society by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License. Keeping Secrets from Ourselves: Understanding Self-deception Through Theory, Evidence and Application Abstract Self-deception is a difficult concept to share with students. Although few students find it implausible that they are capable of keeping secrets from themselves, the social theory, application, and practical demonstration of self-deception is far from straightforward. This work offers a three-step approach to teach a theoretically-grounded, evidence-based, and application-reinforced understanding of self-deception. Rooted in work on identity by Mead (1934), the approach outlined here engages with interdisciplinary case studies derived from social psychology (Greenwald, McGhee and Schwartz 1998) and behavioral economics (Ariely 2012).
    [Show full text]
  • The Fringe Insurgency Connectivity, Convergence and Mainstreaming of the Extreme Right
    The Fringe Insurgency Connectivity, Convergence and Mainstreaming of the Extreme Right Jacob Davey Julia Ebner About this paper About the authors This report maps the ecosystem of the burgeoning Jacob Davey is a Researcher and Project Coordinator at ‘new’ extreme right across Europe and the US, which is the Institute for Strategic Dialogue (ISD), overseeing the characterised by its international outlook, technological development and delivery of a range of online counter- sophistication, and overtures to groups outside of the extremism initiatives. His research interests include the traditional recruitment pool for the extreme-right. This role of communications technologies in intercommunal movement is marked by its opportunistic pragmatism, conflict, the use of internet culture in information seeing movements which hold seemingly contradictory operations, and the extreme-right globally. He has ideologies share a bed for the sake of achieving provided commentary on the extreme right in a range common goals. It examines points of connectivity of media sources including The Guardian, The New York and collaboration between disparate groups and Times and the BBC. assesses the interplay between different extreme-right movements, key influencers and subcultures both Julia Ebner is a Research Fellow at the Institute for online and offline. Strategic Dialogue (ISD) and author of The Rage: The Vicious Circle of Islamist and Far-Right Extremism. Her research focuses on extreme right-wing mobilisation strategies, cumulative extremism and European terrorism prevention initiatives. She advises policy makers and tech industry leaders, regularly writes for The Guardian and The Independent and provides commentary on broadcast media, including the BBC and CNN. © ISD, 2017 London Washington DC Beirut Toronto This material is offered free of charge for personal and non-commercial use, provided the source is acknowledged.
    [Show full text]
  • Fake News and Misinformation Policy Lab Practicum (Spring 2017)
    ST ANFORD Fake News & Misinformation Policy Practicum 2017 PRACTICUM RESEARCFacebookH TEAM: Research Team Jacob Finkel, JD ’19, Steven Jiang,Mufan BS ’17, Luo, PhD ‘22 Mufan Luo, PhD ’22, Rebecca Mears, JD/MPP ’19, Danaë Metaxa-Kakavouli, PhD ’20Camille, Peeples, JD ‘18 Camille Peeples, JD ’18, BrendanArjun Sasso, Shenoy,JD ’19, JD ‘19 Arjun Shenoy, JD ’19, Vincent Sheu, JD/MS ’18 , Nicolás Torres-Echeverry, JSM ’17 Google Research Team INSTRUCTOR AND PROJECTDanaë LEAD MetaxaS: -Kakavouli, PhD ‘20 Nicolás Torres-Echeverry, JSM ‘17 SENATOR RUSS FEINGOLD Edwin A. Heafey, Jr., Visiting Professor of Law Luciana Herman, Ph.D. Twitter Research Team Lecturer in Law Program Director, Law and Policy LabJacob Finkel, JD ‘19 Steven Jiang, BS ‘17 Ashwin Aravind, JD ‘18 Teaching Assistant Rebecca Mears, JD/MPP ‘19 Katie Joseff, MA ‘19 Research Assistant Reddit Research Team October POLICY CLIENT: Brendan Sasso, JD ‘19 Hewlett Foundation MadisonVincent Initiative Sheu, JD/MS ’18 2017 1 Acknowledgements This report reflects the research and analysis of an inter-disciplinary law and graduate student team enrolled in the Stanford Law School Fake News and Misinformation Policy Lab Practicum (Spring 2017). Under the guidance of instructor Senator Russ Feingold, the Edwin A. Heafey Visiting Professor of Law, the practicum surveyed the roles of four major online platforms in the spread of fake news beginning with the 2016 U.S. election. Assisting Senator Feingold in the practicum were Policy Lab Program Director and Lecturer Luciana Herman, Ph.D., and Teaching Assistant Ashwin Aravind, J.D. ’18. Brendan Sasso, J.D. ’19, served as the exceptional lead student editor for the report.
    [Show full text]
  • Arxiv:2009.04885V3
    “Is it a Qoincidence?”: A First Step Towards Understanding and Characterizing the QAnon Movement on Voat.co Antonis Papasavva1, Jeremy Blackburn2 Gianluca Stringhini3, Savvas Zannettou4, and Emiliano De Cristofaro1 1University College London, 2Binghamton University, 3Boston University, 4Max Planck Institute for Informatics [email protected], [email protected], [email protected], [email protected], [email protected] – iDRAMA Lab – Abstract media platforms has helped the spread of conspiracy theo- ries in general, and politically oriented ones in particular. Online fringe communities offer fertile grounds for users to For instance, the Pizzagate conspiracy theory emerged during seek and share paranoid ideas fueling suspicion of mainstream the 2016 US presidential elections, claiming that candidate news, and outright conspiracy theories. Among these, the Hillary Clinton was involved in a pedophile ring [40]. Even QAnon conspiracy theory has emerged in 2017 on 4chan, when widely debunked, conspiracy theories can help motivate broadly supporting the idea that powerful politicians, aristo- detractors and demotivate supporters, thus potentially threat- crats, and celebrities are closely engaged in a global pedophile ening democracies. ring. At the same time, governments are thought to be con- Over the past few years, a new conspiracy, known as trolled by “puppet masters,” as democratically elected offi- “QAnon,” has emerged that is somewhat related to Pizzagate. cials serve as a fake showroom of democracy. It originated on the anonymous Politically Incorrect (/pol/) In this paper, we provide an empirical exploratory anal- board of 4chan by a user going by the nickname “Q,” who ysis of the QAnon community on Voat.co, a Reddit-esque posted numerous threads claiming to be a US government news aggregator, which has recently captured the interest official with a top-secret Q clearance, in October 2017 [10].
    [Show full text]