Content Or Context Moderation? 1 Table of Contents
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Liberation Technology Conference Bios
1 Liberation Technology in Authoritarian Regimes October 11‐12, 2010 Bechtel Conference Center, Encina Hall, Stanford University Conference Attendees’ Bios Esra’a Al Shafei, MideastYouth.com Esra'a Al Shafei is the founder and Executive Director of MideastYouth.com, a grassroots, indigenous digital network that leverages the power of new media to facilitate the struggle against oppression in the Middle East and North Africa. She is a recipient of the Berkman Award from Harvard University's Berkman Center for Internet and Society for "outstanding contributions to the internet and its impact on society," and is currently a TED Fellow and an Echoing Green Fellow. Most recently, her project won a ThinkSocial Award for serving as a "powerful model for how social media can be used to address global problems." Walid Al‐Saqaf, Yemen Portal Walid AL‐SAQAF is a Yemeni activist, software engineer and scholar concerned with studying Internet censorship around the world, but with a special focus on the Middle East. During 1999‐ 2005, he held the position of publisher and editor‐in‐chief of Yemen Times, which was founded by his father in 1990 and since 2009, he has been a PhD candidate at Örebro University in Sweden, where he also teaches online investigative journalism. In 2010, he won a TED fellowship and the Democracy award of Örebro University for his research and activism in promoting access to information and for fighting cyber censorship. Among his notable works is Yemen Portal (https://yemenportal.net), which is a news aggregator focused on content on Yemen and alkasir (https://alkasir.com), a unique censorship circumvention software solution that allows Internet users around the world to access websites blocked by regimes. -
Disinformation, and Influence Campaigns on Twitter 'Fake News'
Disinformation, ‘Fake News’ and Influence Campaigns on Twitter OCTOBER 2018 Matthew Hindman Vlad Barash George Washington University Graphika Contents Executive Summary . 3 Introduction . 7 A Problem Both Old and New . 9 Defining Fake News Outlets . 13 Bots, Trolls and ‘Cyborgs’ on Twitter . 16 Map Methodology . 19 Election Data and Maps . 22 Election Core Map Election Periphery Map Postelection Map Fake Accounts From Russia’s Most Prominent Troll Farm . 33 Disinformation Campaigns on Twitter: Chronotopes . 34 #NoDAPL #WikiLeaks #SpiritCooking #SyriaHoax #SethRich Conclusion . 43 Bibliography . 45 Notes . 55 2 EXECUTIVE SUMMARY This study is one of the largest analyses to date on how fake news spread on Twitter both during and after the 2016 election campaign. Using tools and mapping methods from Graphika, a social media intelligence firm, we study more than 10 million tweets from 700,000 Twitter accounts that linked to more than 600 fake and conspiracy news outlets. Crucially, we study fake and con- spiracy news both before and after the election, allowing us to measure how the fake news ecosystem has evolved since November 2016. Much fake news and disinformation is still being spread on Twitter. Consistent with other research, we find more than 6.6 million tweets linking to fake and conspiracy news publishers in the month before the 2016 election. Yet disinformation continues to be a substantial problem postelection, with 4.0 million tweets linking to fake and conspiracy news publishers found in a 30-day period from mid-March to mid-April 2017. Contrary to claims that fake news is a game of “whack-a-mole,” more than 80 percent of the disinformation accounts in our election maps are still active as this report goes to press. -
Reverse-Engineering Twitter's Content Removal
“We Believe in Free Expression...” Reverse-Engineering Twitter’s Content Removal Policies for the Alt-Right The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:38811534 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA Contents The Problem & The Motivation .............................................................................. 4 Free Speech: Before and After the Internet ......................................................... 5 Speech on Twitter .............................................................................................. 11 Defining the Alt-Right ....................................................................................... 13 The Alt-Right on Social Media ......................................................................... 14 Social Media Reaction to Charlottesville .......................................................... 17 Twitter’s Policies for the Alt-Right ................................................................... 19 Previous Work ................................................................................................... 21 Structure of this Thesis ..................................................................................... -
S:\FULLCO~1\HEARIN~1\Committee Print 2018\Henry\Jan. 9 Report
Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. 1 115TH CONGRESS " ! S. PRT. 2d Session COMMITTEE PRINT 115–21 PUTIN’S ASYMMETRIC ASSAULT ON DEMOCRACY IN RUSSIA AND EUROPE: IMPLICATIONS FOR U.S. NATIONAL SECURITY A MINORITY STAFF REPORT PREPARED FOR THE USE OF THE COMMITTEE ON FOREIGN RELATIONS UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION JANUARY 10, 2018 Printed for the use of the Committee on Foreign Relations Available via World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PUBLISHING OFFICE 28–110 PDF WASHINGTON : 2018 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5012 Sfmt 5012 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN. 9 REPORT FOREI-42327 with DISTILLER seneagle Embargoed for Media Publication / Coverage until 6:00AM EST Wednesday, January 10. COMMITTEE ON FOREIGN RELATIONS BOB CORKER, Tennessee, Chairman JAMES E. RISCH, Idaho BENJAMIN L. CARDIN, Maryland MARCO RUBIO, Florida ROBERT MENENDEZ, New Jersey RON JOHNSON, Wisconsin JEANNE SHAHEEN, New Hampshire JEFF FLAKE, Arizona CHRISTOPHER A. COONS, Delaware CORY GARDNER, Colorado TOM UDALL, New Mexico TODD YOUNG, Indiana CHRISTOPHER MURPHY, Connecticut JOHN BARRASSO, Wyoming TIM KAINE, Virginia JOHNNY ISAKSON, Georgia EDWARD J. MARKEY, Massachusetts ROB PORTMAN, Ohio JEFF MERKLEY, Oregon RAND PAUL, Kentucky CORY A. BOOKER, New Jersey TODD WOMACK, Staff Director JESSICA LEWIS, Democratic Staff Director JOHN DUTTON, Chief Clerk (II) VerDate Mar 15 2010 04:06 Jan 09, 2018 Jkt 000000 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\FULL COMMITTEE\HEARING FILES\COMMITTEE PRINT 2018\HENRY\JAN. -
Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P (Information
The Information Society Series Laura DeNardis and Michael Zimmer, Series Editors Interfaces on Trial 2.0, Jonathan Band and Masanobu Katoh Opening Standards: The Global Politics of Interoperability, Laura DeNardis, editor The Reputation Society: How Online Opinions Are Reshaping the Offline World, Hassan Masum and Mark Tovey, editors The Digital Rights Movement: The Role of Technology in Subverting Digital Copyright, Hector Postigo Technologies of Choice? ICTs, Development, and the Capabilities Approach, Dorothea Kleine Pirate Politics: The New Information Policy Contests, Patrick Burkart After Access: The Mobile Internet and Inclusion in the Developing World, Jonathan Donner The World Made Meme: Public Conversations and Participatory Media, Ryan Milner The End of Ownership: Personal Property in the Digital Economy, Aaron Perzanowski and Jason Schultz Digital Countercultures and the Struggle for Community, Jessica Lingel Protecting Children Online? Cyberbullying Policies of Social Media Companies, Tijana Milosevic Authors, Users, and Pirates: Copyright Law and Subjectivity, James Meese Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P, Robert W. Gehl Weaving the Dark Web Legitimacy on Freenet, Tor, and I2P Robert W. Gehl The MIT Press Cambridge, Massachusetts London, England © 2018 Robert W. Gehl All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. This book was set in ITC Stone Serif Std by Toppan Best-set Premedia Limited. Printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data is available. ISBN: 978-0-262-03826-3 eISBN 9780262347570 ePub Version 1.0 I wrote parts of this while looking around for my father, who died while I wrote this book. -
What's a Patent Owner To
Winter 2018 Vol. 16, Issue 1 A review of developments in Intellectual Property Law Motions to Amend at the PTAB after Aqua Products, Inc. v. Matal – What’s a Patent Owner to Do? By Andrew W. Williams, Ph.D. conducted by the Patent Trial and Appeal Board shifting to the patent owner, however, was In 2011, Congress enacted (“PTAB” or “Board”) that analyzed statistics in not found in either the statute or the rules the America Invents Act and all IPRs, CBMs, and PGRs. The third and most promulgated by the Patent Office. Instead, the created new mechanisms recent iteration included data through the Fiscal PTAB interpreted its regulations in an early to challenge issued claims Year 2017 (which ended on September 30, decision, Idle Free Sys., Inc. v. Bergstrom, Inc.1 at the Patent Office. The 2017). The first thing this study revealed is that In Idle Free, the PTAB indicated that the burden goal was to expeditiously motions to amend were filed in only 275 out is on the patent owner to show “a patentable resolve issues of patent of 2,766 completed trials, or 10%. The Board distinction over the prior art of record and also validity in response to the counted a trial as “completed” when it was prior art known to the patent owner.”2 The public outcry that validity terminated due to settlement, when there was Board subsequently relaxed the patent owner’s challenges in the federal courts were too a request for adverse judgement, when it was burden in MasterImage 3D, Inc. v. -
FCJ-156 Hacking the Social: Internet Memes, Identity Antagonism, and the Logic of Lulz
The Fibreculture Journal issn: 1449-1443 DIGITAL MEDIA + NETWORKS + TRANSDISCIPLINARY CRITIQUE issue 22 2013: Trolls and the Negative Space of the Internet FCJ-156 Hacking the Social: Internet Memes, Identity Antagonism, and the Logic of Lulz Ryan M. Milner College of Charleston Abstract: 4chan and reddit are participatory media collectives undergirded by a “logic of lulz” that favours distanced irony and critique. It often works at the expense of core identity categories like race and gender. However, the logic need not be entirely counterproductive to public discourse. Provided that diverse identities find voice instead of exclusion, these sites may facilitate vibrant, agonistic discussion instead of disenfranchising antagonism. In order to assess this potential for productive agonism, I undertook a critical discourse analysis of these collectives. Emphasising the image memes they produce, I evaluated discourses on race and gender. Both race and gender representations were dominated by familiar stereotypes and partial representations. However, while dissenting perspectives on race were repressed or excluded, dissenting perspectives on gender were vocalised and contested. The ‘logic of lulz’ facilitated both dominance and counter, each articulated with heavy reliance on irony and critique. This logic ambiguously balanced agonism and antagonism, but contestation provided sharper engagement than repression. 62 FCJ-156 fibreculturejournal.org Ryan M. Milner ‘A troll exploits social dynamics like computer hackers exploit security loop- holes…’ (Adrian Chen, 2012 October 12) In October 2012, reddit – a popular link aggregation service and public discussion forum – was embroiled in a prominent controversy. Adrian Chen, a journalist for the news site Gawker, had just revealed the ‘offline’ identity of Violentacrez, one of reddit’s ‘most reviled characters but also one if its most beloved users’ (Chen, 2012 October 12). -
New York Times: Free Speech Lawyering in the Age of Google and Twitter
THE “NEW” NEW YORK TIMES: FREE SPEECH LAWYERING IN THE AGE OF GOOGLE AND TWITTER Marvin Ammori INTRODUCTION When Ben Lee was at Columbia Law School in the 1990s, he spent three months as a summer associate at the law firm then known as Lord, Day & Lord, which had represented the New York Times1 in New York Times Co. v. Sullivan.2 During those months, Lee listened to the firm’s elder partners recount gripping tales of the Sullivan era and depict their role in the epic speech battles that shaped the future of free expression. Hearing these stories, a young Lee dreamed that one day he too would participate in the country’s leading speech battles and have a hand in writing the next chapter in freedom of expression. When I met with Lee in August 2013, forty-nine years after Sulli- van, he was working on freedom of expression as the top lawyer at Twitter. Twitter and other Internet platforms have been heralded for creating the “new media,”3 what Professor Yochai Benkler calls the “networked public sphere,”4 for enabling billions around the world to publish and read instantly, prompting a world where anyone — you and I included — can be the media simply by breaking, recounting, or spreading news and commentary.5 Today, freedom of the press means ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– Fellow, New America Foundation; Partner, the Ammori Group. The Ammori Group is an “opinionated law firm” dedicated to advancing freedom of expression and Internet freedom, and its clients have included Google, Dropbox, Automattic, Twitter, and Tumblr. The author would like to thank Alvaro Bedoya, Yochai Benkler, Monika Bickert, Nick Bramble, Alan Davidson, Tony Falzone, Mike Godwin, Ramsey Homsany, Marjorie Heins, Adam Kern, Ben Lee, Andrew McLaughlin, Luke Pelican, Jason Schulman, Aaron Schur, Paul Sieminski, Ari Shahdadi, Laura Van Dyke, Bart Volkmer, Dave Willner, and Jonathan Zittrain. -
Wednesday October 4
We offer 20 tracks to help you navigate the schedule. Like tracks are color coded for even easier exploration. CAREER ARTIFICIAL WEDNESDAY INTELLIGENCE COMMUNITY OCTOBER 4 COMPUTER SYSTEMS CRA-W ENGINEERING STUDENT DATA SCIENCE OPPORTUNITY LAB HUMAN COMPUTER ACM RESEARCH INTERACTION COMPETITION INTERACTIVE MEDIA GENERAL POSTER SESSION SECURITY/PRIVACY GENERAL SESSION SOFTWARE ENGINEERING LUNCHES & RECEPTIONS OPEN SOURCE SPECIAL SESSIONS ORGANIZATION IOT / WEARABLE TECH TRANSFORMATION PRODUCTS A TO Z //////////////////////////////////////////////// TUESDAY, OCTOBER 3 / 5 - 6 p.m. GENERAL SESSION PRESENTATION First Timers Orientation OCCC W230C All NOTE: OCCC stands for the Orange County Convention Center #GHC17 DAY 1: WEDNESDAY #GHC17 DAY 1: WEDNESDAY //////////////////////////////////////////////// //////////////////////////////////////////////// 9 - 10:30 a.m. 11 a.m. - 6:30 p.m. GENERAL SESSION CAREER Wednesday Keynote Interviews OCCC WA2 Melinda Gates OCCC WB3/4 (Bill & Melinda Gates Foundation), Fei-Fei Li //////////////////////////////////////////////// (Stanford University; Google Cloud) 11:30 a.m. - 12:30 p.m. ARTIFICIAL INTELLIGENCE PRESENTATIONS //////////////////////////////////////////////// 10:30 a.m. - 5:30 p.m. Presentations: AI for Social Good OCCC W304C Jennifer Marsman (Microsoft), CAREER EXPO Neelima Kumar (Oracle) Beginner/Intermediate Career Fair CAREER PANEL OCCC WA3/4 & WB1/2 All For Good and For Profit: Exploring Careers in SPECIAL SESSIONS Social Enterprise Speaker Lounge OCCC W305 All Hyatt Regency Ballroom V Hannah SPECIAL SESSIONS Calhoon (Blue Ridge Labs@Robin Hood), Kamla Kasichainula (Change.org), Erin Mote Faculty Lounge OCCC W209C Faculty (InnovateEDU), Morgan Berman (MilkCrate), Donnovan Andrews (Overture) All //////////////////////////////////////////////// 10:30 a.m. - 6 p.m. CAREER PANEL Women in Tech: Get a Seat @ the Table! SPECIAL SESSIONS Hyatt Regency Ballroom S Monique Student Lounge sponsored by D.E. -
PCAST Meeting ‐ November 21, 2013
PCAST Meeting ‐ November 21, 2013 Welcome & Education Information Technology (EdIT) Letter report >> John Holdren: I wonder if we could get going here. We're a couple of minutes behind, but not too far behind. Let me welcome the members of PCAST, the members of the OSTP leadership, and the PCAST secretariat from OSTP who are here and let me welcome the members of the wider science and technology community, who are joining us either in person or over the live streaming webcast, which is underway. We have as usual a full agenda. We'll be turning to it in just a moment. I just have one matter of celebration to note that's our PCAST member Mario Molina yesterday received from President Obama the Presidential Medal Of Freedom. I want to congratulate Mario. I believe with this award it can be safely said that there's no prizes left that Mario has not won, and therefore he can relax. Not likely. Eric, would you like to add any words of welcome. >> Eric Lander: I would like to welcome the whole PCAST including our two new members of the PCAST. We're very excited to have Michael McQuade and Susan Graham who is joining us in PCAST and we just have a lot of things going on. We're going to hear about two very exciting and important reports. So thank you everyone, as always, for the hard work and for being here. >> John Holdren: Let us turn straight to the business of the day and the first item on that agenda is for PCAST to discuss and approve the educational information technology MOOC focused letter report. -
The Sky's Limit California
THE SKY’S LIMIT CALIFORNIA: WHY THE PARIS CLIMATE GOALS DEMAND THAT CALIFORNIA LEAD IN A MANAGED DECLINE OF OIL EXTRACTION MAY 2018 In collaboration with This report was written and researched by Kelly Trout of Oil Change International, with additional research by Kyle Ferrar of FracTracker Alliance and David Hughes of Global Sustainability Research. It includes additional writing and research contributions from Janet Redman, Greg Muttitt, Hannah McKinnon, and David Turnbull, all of Oil Change International, Roger Lin of The Center on Race, Poverty & the Environment, and José López of Communities for a Better Environment. It was edited by Collin Rees of Oil Change International. Design adjustments by Matt Maiorana of Oil Change International. The authors are grateful for feedback from the following reviewers: Zoë Cina-Sklar and Kevin Koenig, Amazon Watch; Kassie Siegel, Maya Golden-Krasner, and Shaye Wolf, Center for Biological Diversity; Alvaro Palacios Casanova, Center for Environmental Health; Greg Karras, Communities for a Better Environment; Tim Donaghy, Greenpeace; Nicole J. Wong, MPH, Redeemer Community Partnership; Matt Krogh, Stand; Peter Erickson, Stockholm Environment Institute; Frank Ackerman, Synapse Energy Economics; Madeline Stano, The Greenlining Institute. Design: [email protected] Cover Image: John Ciccarelli, Bureau of Land Management May 2018. Published by Oil Change International (www.priceofoil.org), in collaboration with: 350.org http://www.350.org Amazon Watch http://amazonwatch.org Asian Pacific Environmental -
Silk Road: After Being Closed Twice, Can the Brand Ever 'Rise Again?'
GDPO Situation Analysis January 2015 Silk Road: After being closed twice, can the brand ever ‘rise again?’ Alois Afilipoaie and Patrick Shortis Since 2011 the Silk Road marketplace has been known as the flagship brand of Dark Net markets. For a long time it was the cornerstone of illicit trade over the Dark Net, despite being shut down by the FBI in October 2013 its successor Silk Road 2.0 was created in a month and quickly outgrew its predecessor. On November 6th 2014, the Silk Road 2.0 was closed in an international law enforcement operation dubbed ‘Operation Onymous’1. Despite being taken down twice by law enforcement, the Silk Road was both a pathfinder and a trend-setter in the world of Dark Net markets. As a brand it will never be forgotten and may possibly continue to rise repeatedly as a hidden service on the Tor network, however as a marketplace the damage done by two busts may have finally put an end to its viability as a popular destination for those looking to engage in illicit trade. The Silk Road marketplace (February 2011–October 2013) Founded in February 2011, The Silk Road marketplace2 created the most popular brand of any Dark Net market. Media attention in a 2011 article by Gawker writer Adrian Chen shot it to internet fame. Initially it sold a plethora of illicit items including drugs and weapons. Eventually it refined its identity as a market with libertarian philosophies and an ethical approach to its wares, it removed weapons from its listings as well as ‘anything whose purpose is to harm or defraud’, giving it an ethical edge over its competitors that many users enjoyed.