Angel Or Devil? a Privacy Study of Mobile Parental Control Apps

Total Page:16

File Type:pdf, Size:1020Kb

Angel Or Devil? a Privacy Study of Mobile Parental Control Apps Proceedings on Privacy Enhancing Technologies ..; .. (..):1–22 Álvaro Feal*, Paolo Calciati, Narseo Vallina-Rodriguez, Carmela Troncoso, and Alessandra Gorla Angel or Devil? A Privacy Study of Mobile Parental Control Apps Abstract: Android parental control applications are 1 Introduction used by parents to monitor and limit their children’s mobile behaviour (e.g., mobile apps usage, web brows- The dependency of society on mobile services to per- ing, calling, and texting). In order to offer this service, form daily activities has drastically increased in the last parental control apps require privileged access to sys- decade [81]. Children are no exception to this trend. Just tem resources and access to sensitive data. This may in the UK, 47% of children between 8 and 11 years of age significantly reduce the dangers associated with kids’ have their own tablet, and 35% own a smartphone [65]. online activities, but it raises important privacy con- Unfortunately, the Internet is home for a vast amount cerns. These concerns have so far been overlooked by of content potentially harmful for children, such as un- organizations providing recommendations regarding the censored sexual imagery [20], violent content [91], and use of parental control applications to the public. strong language [51], which is easily accessible to minors. We conduct the first in-depth study of the Android Furthermore, children may (unawarely) expose sensitive parental control app’s ecosystem from a privacy and data online that could eventually fall in the hands of regulatory point of view. We exhaustively study 46 apps predators [2], or that could trigger conflicts with their from 43 developers which have a combined 20M installs peers [30]. in the Google Play Store. Using a combination of static Aiming at safeguarding children’s digital life, some and dynamic analysis we find that: these apps are on av- parents turn to parental control applications to monitor erage more permissions-hungry than the top 150 apps children’s activities and to control what they can do on in the Google Play Store, and tend to request more dan- their smartphones [63, 78]. The typical parental control gerous permissions with new releases; 11% of the apps app allows parents to filter, monitor, or restrict com- transmit personal data in the clear; 34% of the apps munications, content, system features, and app’s execu- gather and send personal information without appro- tion [89]. Other apps provide parents with fine-grained priate consent; and 72% of the apps share data with reports about children’s usage of the phone, their social third parties (including online advertising and analyt- interactions, and their physical location. An example of ics services) without mentioning their presence in their the former is the content discovery platform Safe Mode privacy policies. In summary, parental control applica- with Free Games for Kids by KIDOZ, and of the latter tions lack transparency and lack compliance with reg- is the Norton Family app. ulatory requirements. This holds even for those appli- To provide these features, parental control apps rely cations recommended by European and other national on the collection and handling of children’s behavioral security centers. (e.g., location, browsing activities, and phone calls) and Keywords: Parental control, Android, mobile apps, personal data (e.g., unique identifiers and contacts), in static analysis, dynamic analysis many cases, using techniques and methods similar to those of spyware [27]. Yet, as with many regular An- PACS: droid applications, parental control software may also DOI Editor to enter DOI integrate data-hungry third-party advertising SDKs— Received ..; revised ..; accepted ... to monetize their software— and analytics SDKs—to monitor the behavior of their users, create bug reports, and build user profiles. As a consequence of Android’s *Corresponding Author: Álvaro Feal: IMDEA Net- works Institute / Universidad Carlos III de Madrid, E-mail: [email protected] Carmela Troncoso: Spring Lab EPFL, E-mail: Paolo Calciati: IMDEA Software Institute / Universidad carmela.troncoso@epfl.ch Politécnica de Madrid, E-mail: [email protected] Alessandra Gorla: IMDEA Software Institute, E-mail: Narseo Vallina-Rodriguez: IMDEA Networks Institute / [email protected] ICSI, E-mail: [email protected] A Privacy Study of Mobile Parental Control Apps 2 permission model, these SDKs enjoy the same set of seven ad-related libraries found are COPPA compli- permissions granted by the user to the host app. Apps ant according to Google’s 2019 list of self-certified also might inadvertently expose data to in-path network libraries suitable for children apps [43]. observers if they use insecure protocols to transmit sen- C. The outgoing flows of 35% these apps are directed sitive data. These practices involve great privacy risks to third parties, but 79% of the apps do not name for minors, e.g., if data is used to profile children’s be- these organizations in their privacy policies (§ 6). havior or development, or if the data becomes compro- We find 67% apps collecting sensitive data without mised [64]. user consent, and 6 apps that do not implement ba- To help parents choose among parental control so- sic security mechanisms such as the use of encryp- lutions, security centers at the European level [1, 33] tion for Internet traffic. have analyzed a number of parental control solutions. D. Despite being required by regulations [29, 35], only Their analysis considers four dimensions: functionality, half of the apps clearly inform users about their effectiveness, usability, and security—defined as their data collection and processing practices (§ 7). While effectiveness at deterring children from bypassing the 59% of the apps admit third party usage of sensitive system. However, these reports do not provide any pri- data, only 24% disclose the full list of third parties vacy risk analysis, nor consider the lack of transparency embedded in the software. Furthermore, 18% do not or other potential violations of relevant privacy laws report any data sharing activity even though we find with specific provisions to safeguard minors’ privacy, evidence of third-party data collection through em- e.g., the European General Data Protection Regulation bedded SDKs. (GDPR) [29] and the U.S. Children Online Privacy and Protection Act (COPPA) [35]. In this paper, we present the first comprehensive 2 Parental Control Apps privacy-oriented analysis of parental control apps for Android from a technical and regulatory point of view. Android parental control apps offer diverse features to We study 46 apps using both static and dynamic analy- control children’s digital activities. In line with previous sis methods to characterize their runtime behavior and work [56, 89], we classify apps that enable parents to their data collection and data sharing practices. We also monitor children’s behavior, including location [47], as study the accuracy and completeness of their privacy monitoring tools; and we classify apps that enable par- policies, identifying potential violations of existing reg- ents to filter content and to define usage rules to limit ulations to protect minors. We note that during our the children’s actions as restriction apps. Some apps of- analysis we do not collect any data from children or any fer multiple functionalities simultaneously, and we label other user. (§ 3.1.4 describes the ethical considerations). them as monitoring since it is the most invasive of the Our main findings are the following: two categories. A. Static taint analysis reveals that both apps and em- The way in which parental control apps enforce bedded third-party libraries disseminate sensitive these functionalities is varied. Common alternatives are information, e.g., the IMEI, location, or MAC ad- replacing Android’s Launcher with a custom overlay in dress (§ 4). Apps also use custom permissions to which only whitelisted apps are available; installing a obtain functionalities exposed by other apps’ de- web browser where developers have full control to moni- velopers or handset vendors, revealing (commercial) tor and restrict web traffic; or leveraging Android’s VPN partnerships between them. permission [13] to gain full visibility and control over B. We find that almost 75% of apps contain data- network traffic. The most common criteria to customize driven third-party libraries for advertisement, so- app’s behavior are age and blacklisting/whitelisting. cial networks, and analytic services (§ 5). Further- The former restricts the type of content or defines the more, 67% apps share private data without user level of monitoring depending on the children’s age. In consent (§ 6.3), even though some of these apps general, older children are granted access to a larger set are recommended by public bodies (e.g., SIP-Bench of webpages and applications than youngsters. In the III [1, 33]). Despite processing children’s data, 4% of latter, parents can either list applications or webpages the apps use libraries which claim to not be directed that they deem inappropriate for their children, or add at children and thus do not take extra measures to appropriate content to whitelists. comply with privacy laws specific to children (e.g., U.S. COPPA rule [35]). Moreover, only two of the A Privacy Study of Mobile Parental Control Apps 3 Most parental control apps have two different com- consent from the parent or legal guardian of a minor un- ponents or modes: i) the parent app or mode, and ii) der the age of 16 before collecting and processing their the children app or mode. The parent app can run either personal data. Both regulations explicitly prohibit the on the children’s or on the parent’s device enabling ac- collection and processing of minor’s data for the purpose cess to the children’s app data, and to the dashboard for of marketing or user profiling, and force developers to setting monitoring or blocking rules.
Recommended publications
  • The Evocative and Persuasive Power of Loaded Words in the Political Discourse on Drug Reform
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by OpenEdition Lexis Journal in English Lexicology 13 | 2019 Lexicon, Sensations, Perceptions and Emotions Conjuring up terror and tears: the evocative and persuasive power of loaded words in the political discourse on drug reform Sarah Bourse Electronic version URL: http://journals.openedition.org/lexis/3182 DOI: 10.4000/lexis.3182 ISSN: 1951-6215 Publisher Université Jean Moulin - Lyon 3 Electronic reference Sarah Bourse, « Conjuring up terror and tears: the evocative and persuasive power of loaded words in the political discourse on drug reform », Lexis [Online], 13 | 2019, Online since 14 March 2019, connection on 20 April 2019. URL : http://journals.openedition.org/lexis/3182 ; DOI : 10.4000/ lexis.3182 This text was automatically generated on 20 April 2019. Lexis is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. Conjuring up terror and tears: the evocative and persuasive power of loaded w... 1 Conjuring up terror and tears: the evocative and persuasive power of loaded words in the political discourse on drug reform Sarah Bourse Introduction 1 In the last few years, the use of the adjective “post-truth” has been emerging in the media to describe the political scene. This concept has gained momentum in the midst of fake allegations during the Brexit vote and the 2016 American presidential election, so much so that The Oxford Dictionary elected it word of the year in 2016. Formerly referring to the lies at the core of political scandals1, the term “post-truth” now describes a situation where the objective facts have far less importance and impact than appeals to emotion and personal belief in order to influence public opinion2.
    [Show full text]
  • Maternal Activism
    1 Biography as Philosophy The Power of Personal Example for Transformative Theory As I have written this book, my kids have always been present in some way. Sometimes, they are literally present because they are beside me playing, asking questions, wanting my attention. Other times, they are present in the background of my consciousness because I’m thinking about the world they live in and the kind of world I want them to live in. Our life together is probably familiar to many U.S. middle-class women: I work full-time, the kids go to school full time, and our evenings and weekends are filled with a range of activities with which we are each involved. We stay busy with our individual activities, but we also come together for dinner most nights, we go on family outings, and we enjoy our time together. As much time as I do spend with my kids, I constantly feel guilty for not doing enough with them since I also spend significant time preparing for classes, grading, researching, and writing while I’m with them. Along with many other women, I feel the pressure of trying and failing to balance mothering and a career. Although I feel as though I could be a better mother and a bet- ter academic, I also have to concede that I lead a privileged life as a woman and mother. Mothers around the world would love to have the luxury of providing for their children’s physical and mental well-being. In the Ivory Coast and Ghana, children are used as slave labor to harvest cocoa beans for chocolate (Bitter Truth; “FLA Highlights”; Hawksley; The Food Empowerment Project).
    [Show full text]
  • The Theory of Dyadic Morality: © 2017 by the Society for Personality and Social Psychology, Inc
    PSRXXX10.1177/1088868317698288Personality and Social Psychology ReviewSchein and Gray 698288research-article2017 Article Personality and Social Psychology Review 1 –39 The Theory of Dyadic Morality: © 2017 by the Society for Personality and Social Psychology, Inc. Reprints and permissions: Reinventing Moral Judgment by sagepub.com/journalsPermissions.nav DOI:https://doi.org/10.1177/1088868317698288 10.1177/1088868317698288 Redefining Harm pspr.sagepub.com Chelsea Schein1 and Kurt Gray1 Abstract The nature of harm—and therefore moral judgment—may be misunderstood. Rather than an objective matter of reason, we argue that harm should be redefined as an intuitively perceived continuum. This redefinition provides a new understanding of moral content and mechanism—the constructionist Theory of Dyadic Morality (TDM). TDM suggests that acts are condemned proportional to three elements: norm violations, negative affect, and—importantly—perceived harm. This harm is dyadic, involving an intentional agent causing damage to a vulnerable patient (A→P). TDM predicts causal links both from harm to immorality (dyadic comparison) and from immorality to harm (dyadic completion). Together, these two processes make the “dyadic loop,” explaining moral acquisition and polarization. TDM argues against intuitive harmless wrongs and modular “foundations,” but embraces moral pluralism through varieties of values and the flexibility of perceived harm. Dyadic morality impacts understandings of moral character, moral emotion, and political/cultural differences, and provides research guidelines for moral psychology. Keywords morality, social cognition, judgment/decision making, moral foundations theory, values The man intentionally gished the little girl, who cried. Kellogg, 1890, p. 233). The creator of Kellogg’s cereal Gish is not a real word, but when people read this sentence, was claiming that masturbation was morally wrong they automatically judge the man to be doing something because of the harm it caused.
    [Show full text]
  • Social Work and the Rights of the Child
    International Federation of Social Workers Social Work and the Rights of the Child A Professional Training Manual on the UN Convention Front-page photo: UNICEF/DO179-0001/Rotner Print: Fischer AG für Data und Print, CH-3110 Münsingen, Switzerland IFSW Manual: Social Work and the Rights of the Child SOCIAL WORK AND THE RIGHTS OF THE CHILD A Professional Training Manual on the UN Convention 1 INTRODUCTION 4 2 BACKGROUND 5 3 A COMMITMENT TO CHILDREN’S HUMAN RIGHTS 7 4 MAKING SENSE OF THE CONVENTION ON THE RIGHTS OF THE CHILD 10 I GENERAL MEASURES OF IMPLEMENTATION 11 (Articles 4, 42 and 44) A Comprehensive review of legislation, policy and practice 11 B Permanent mechanisms to ensure implementation 11 C Budgetary analysis and allocation of necessary resources 11 D Promoting the Convention to professionals and to the public 11 E The role of social workers in promoting full compliance with the Convention 11 II DEFINITION OF THE CHILD 15 (Article 1) Variations in national legislation, minimum ages and the application of the Convention in relation to: A Civil Law 16 B Criminal Law 16 C Constitutional Law 17 D Employment Law 17 E Rights to know biological origins 19 F Access to education 19 G Sexual consent and marriage 20 H Voluntary and forced conscription into the armed forces 21 I Religious freedom 21 J Use of alcohol and other controlled substances 22 III GENERAL PRINCIPLES 24 A Non-discrimination (art 2) 24 B Best interests of the child (art 3) 25 C Respect for the views of the child (art 12) 29 IV SURVIVAL AND DEVELOPMENT 30 (Article 6) 1 IFSW Manual: Social Work and the Rights of the Child V BASIC HEALTH AND WELFARE 33 (Articles 6, 18 para 3, 23, 24, 26 and 27 paras 1-3) A Health and health services (art 24) 33 B Social security and child care services and facilities (articles 26 and 34 18 para.
    [Show full text]
  • Since Sylvia Plath's Death, a Mythology Has Sprung up Around
    Plath Profiles 215 The Drama of Confession: Orchestration of Emotion and Self-Disclosure in Ariel Suzanne Richter Since Sylvia Plath's death, a popular mythology has sprung up. Many readers feel they know who she was and what she was about, and their responses to what they think they know have often been quite extreme. But we cannot know Plath. From the poems alone, we cannot make assumptions as to the nature of Plath's personality, simply because her poems may show us a speaker who is, in turn, hysterical, manipulative, melodramatic, cool, and angry. It does not mean the poet was necessarily this way, in either her private or public life. Regarding the polarized response Plath often calls up, Ernest Hilbert in his essay "The Voice of the Poet" (2005) writes: The first holds that her death was a necessary final act in the literary passion play of a woman's escape from a world of persecution and limits… The other camp is one of dismissive chauvinism, endeavoring half-heartedly to corrupt her reputation with imputations that she was marginally-talented, conceited, pampered, and would have been profoundly unhappy whatever her circumstances. (cprw.com) Yet a careful reading of Plath's poems reveals that they are neither the cathartic outpourings of a spoiled, upper-class housewife nor the wild, deranged writings of a narcissistic lunatic. Plath's poems are deliberately stylized and carefully crafted. Many theatrical devices are, in fact, employed in these poems. Two of the primary devices are narrative masks and heightened use of language. Rhetorical gestures are frequently delivered as questions, imperatives, and exclamations.
    [Show full text]
  • The Phalanstery
    THE CHILDREN AT THE PHALANSTERY. A FAMILIAR DIALOGUE ON EDUCATION. BY F. CANT AGREL. TRANSLATED BY FRANCIS GEO. SHAW. NEW YORK: WILLIAM H. GRAHAM, TRIBUNE BUILDING. 1848. ENTERED, according to Act of Congress, in the year 1848, by FRANCIS GEO. SHAW, In the Clerk's Office of the District Court for the Southern Dbtrict of New Y ark. R. CRAIGHEAD, PRINTER, 112 FULTON STRE:ET. PREFACE. THERE are few households in which the children are not heard crying from morning till night: the mother-in-law says it is the fault of her daughter-in-law ; the parents and friends, that it is the fault of the child ; uninterested persons make the consoling reflection, that in a more advanced age more serious causes of sorrow will incessantly be found. In the meanwhile the mother and the child console each other by a tender embrace ; joy and smiles reappear upon all faces. A few moments afterwards, fresh tears- Whom must we decide to be right, and whom wrong? We must first decide that the children are right, and then that the grown persons are wrong. Who pretend to be reasonable? The grown persons certainly ; and there they are about the children, worrying, fussing, without being able to divine the cause of those tears ; still more, they themselves very often cause those inno­ cent tears to flow, by their ignorance, their harshness, th~ir fan­ cies ; they pretend to regulate at their will the tastes of those children, and their steps, their words and their gestures. But no, we must not yet blame the parents and the friends; alas! they do what they can, they do what they have been taught, and it is not their fault if they do not succeed any better.
    [Show full text]
  • Identity and Gender Constructs in "Written on the Body"
    Western Michigan University ScholarWorks at WMU Honors Theses Lee Honors College 12-6-2013 Identity and Gender Constructs in "Written on the Body" Paige Van De Winkle Western Michigan University, [email protected] Follow this and additional works at: https://scholarworks.wmich.edu/honors_theses Part of the English Language and Literature Commons Recommended Citation Van De Winkle, Paige, "Identity and Gender Constructs in "Written on the Body"" (2013). Honors Theses. 2392. https://scholarworks.wmich.edu/honors_theses/2392 This Honors Thesis-Open Access is brought to you for free and open access by the Lee Honors College at ScholarWorks at WMU. It has been accepted for inclusion in Honors Theses by an authorized administrator of ScholarWorks at WMU. For more information, please contact [email protected]. GENDER AND IDENTITY AS SOCIAL CONSTRUCTS IN WRITTEN ON THE BODY 1 Identity and Gender Constructs Written on the Body “Gender is a kind of persistent impersonation that passes as the real” -Judith Butler, Gender Trouble For Jacques Derrida, deconstruction allows for a flexible vision of the world. He takes a binary opposition, finds something that is on each side of the binary, and concludes that the concept is actually flexible. One such binary is male/female. In Written on the Body, Jeanette Winterson deconstructs this binary by telling a story with a genderless narrator, thus showing that there are so many actions, behaviors, and roles that are not related to gender, though they might be assigned a gender association in society. Gender -- defined here as social differences between masculine and feminine, including some essential physical differences -- is frequently assumed to be something that determines one's attitudes, preferences, and abilities in professions, relationships, and other wide-ranging parts of life.
    [Show full text]
  • Childhood, Violence, and Memory in the White Ribbon Joseph Kuster University of New Mexico
    University of New Mexico UNM Digital Repository Foreign Languages & Literatures ETDs Electronic Theses and Dissertations Fall 12-15-2016 Those that Trespass Against Us: Childhood, Violence, and Memory in The White Ribbon Joseph Kuster University of New Mexico Follow this and additional works at: https://digitalrepository.unm.edu/fll_etds Part of the Comparative Literature Commons, French and Francophone Language and Literature Commons, and the German Language and Literature Commons Recommended Citation Kuster, Joseph. "Those that Trespass Against Us: Childhood, Violence, and Memory in The White Ribbon." (2016). https://digitalrepository.unm.edu/fll_etds/120 This Thesis is brought to you for free and open access by the Electronic Theses and Dissertations at UNM Digital Repository. It has been accepted for inclusion in Foreign Languages & Literatures ETDs by an authorized administrator of UNM Digital Repository. For more information, please contact [email protected]. i Joseph Kuster Candidate Foreign Languages and Literatures (German Studies) Department This thesis is approved, and it is acceptable in quality and form for publication: Approved by the Thesis Committee: Dr. Susanne Baackmann, Chairperson Dr. Katrin Schroeter Dr. Jason Wilby ii THOSE THAT TRESPASS AGAINST US: CHILDHOOD, VIOLENCE, AND MEMORY IN THE WHITE RIBBON by JOSEPH KUSTER B.A., German, University of New Mexico, 2014 M.A., German Studies, University of New Mexico, 2017 THESIS Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts The University of New Mexico Albuquerque, New Mexico May, 2017 iii Acknowledgments I would like to acknowledge and thank Dr. Susanne Baackmann, my advisor and committee chair, for her encouragement and support throughout the process of writing this project.
    [Show full text]
  • The Vatsalya Udayan: a System of Care for Indian Orphans
    THE VATSALYA UDAYAN: A SYSTEM OF CARE FOR INDIAN ORPHANS __________________________________________________ A Thesis Presented to The Honors Tutorial College Ohio University __________________________________________________ In Partial Fulfillment of the Requirements for Graduation from the Honors Tutorial College with the degree of Bachelor of Arts in Social Work __________________________________________________ by Megan Tara Casebolt June 2011 This thesis has been approved by The Honors Tutorial College and the Department of Social Work _______________________________________ Dr. Warren Galbreath Assistant Professor, Social Work Ohio University Eastern Campus Thesis Advisor _______________________________________ Dr. Solveig Spjeldnes Assistant Professor, Social Work Honors Tutorial College, Director of Studies Social Work _______________________________________ Dr. Jeremy Webster Dean, Honors Tutorial College Table of Contents Introduction 1 Brief Background 1 Purpose of the Study 3 Research Questions 6 Relevance to Social Work Practice 6 Literature Review 8 Rights and Protection 8 Health and Sanitation 11 Education 13 Foster Care and Adoption 15 Care for the Elderly 16 Family Structures 19 Gaps in the Literature 20 Methods 22 History and Development 22 Case Study 23 Theory 28 Globalization Theory 28 Family Systems Theory 34 Policy Analysis Model 37 History and Development of Child Welfare Programs for Orphans 41 Early India: 2500 B.C.-10th cent. 41 Muslim India: 10th cent.-1858 45 The English in India: 1600s-1947 47 Guardians and
    [Show full text]
  • Understanding Children's Perception of Privacy Risks Online
    ‘I make up a silly name’: Understanding Children’s Perception of Privacy Risks Online Jun Zhao Ge Wang Carys Dally [email protected] [email protected] [email protected] Department of Computer Science. Department of Information Studies. Department of Experimental University of Oxford University College London Psychology. University of Oxford Oxford, UK London, UK Oxford, UK Petr Slovak∗ Julian Edbrooke-Childs† Max Van Kleek [email protected] [email protected] Nigel Shadbolt Department of Informatics, UCL Interaction Centre, University [email protected] King’s College London College London [email protected] London, UK London, United Kingdom Department of Computer Science. University of Oxford Oxford, UK ABSTRACT CCS CONCEPTS Children under 11 are often regarded as too young to compre- • Security and privacy → Social aspects of security and hend the implications of online privacy. Perhaps as a result, privacy; Privacy protections. little research has focused on younger kids’ risk recogni- tion and coping. Such knowledge is, however, critical for KEYWORDS designing efficient safeguarding mechanisms for this age Privacy, Family Technologies, Children, Tablet Computers, group. Through 12 focus group studies with 29 children aged Scaffolding 6-10 from UK schools, we examined how children described privacy risks related to their use of tablet computers and ACM Reference Format: Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Edbrooke- what information was used by them to identify threats. We Childs, Max Van Kleek, and Nigel Shadbolt. 2019. ‘I make up a silly found that children could identify and articulate certain pri- name’: Understanding Children’s Perception of Privacy Risks On- vacy risks well, such as information oversharing or revealing line.
    [Show full text]
  • To Honor All Children from Prejudice, to Discrimination, to Hatred… to Holocaust
    TO HONOR ALL CHILDREN FROM PREJUDICE, TO DISCRIMINATION, TO HATRED… TO HOLOCAUST Photo courtesy of the United States Holocaust Memorial Museum 5-8TH GRADE HOLOCAUST/GENOCIDE CURRICULUM STATE OF NEW JERSEY COMMISSION ON HOLOCAUST EDUCATION To Honor All Children From Prejudice to discrimination to Hatred….to holocaust New Jersey State Holocaust curriculum guide For grades 5-8 Prepared by curriculum committee members Barbara Hadzima, Ed.D Karen H. Levine Molly Maffei Peppy Margolis Cheryl Riley Cecile Seiden Colleen Tambuscio Regina Townsend Helen M. Simpkins, Chair New Jersey Commission on Holocaust Education Table of Contents Title Page Message to Our Colleagues 1 About the Curriculum 3 Prejudice and Discrimination Unit 4 Unit Outline 5 Prejudice and Discrimination Unit Introduction 10 Nory Ryan's Song 11 The Slave Dancer 20 The Diving Bell 28 Call Me Ruth 34 The Star Fisher 39 Amistad Rising 45 On the Long Trail Home 48 Pink and Say 51 Dragonwings 55 The Circlemaker 63 Esperanza Rising 65 The Gold Cadillac 74 Roll of Thunder, Hear My Cry 76 The Watsons Go To Birmingham 83 Children of the Wolf 85 The Cure 86 Poetry by Diane Stelling 99 The World Changes: Rise of Nazism Unit 105 Unit Outline 106 The World Changes: Rise of Nazism Unit Introduction 111 Memories of My Life in a Polish Village 115 Smoke and Ashes: "Nazis and Jews of Germany" 118 Flowers on the Wall 123 One Eye Laughing, the Other Weeping 125 Play to the Angel 132 Friedrich: "The Ball" 137 Friedrich: "I Was There" 139 Kindertransport 143 Flying Against the Wind (2 lessons) 146
    [Show full text]
  • New Worlds for Old by Herbert George Wells
    New Worlds For Old By Herbert George Wells 1 INTRODUCTORY REMARKS "Undiluted Atheism, theft and immorality.... I know of no language sufficiently potent to express fully my absolute detestation of what I believe to be the most poisonous doctrine ever put forward, namely Socialism." HIS GRACE THE DUKE OF RUTLAND. "Let all parties then unite to defeat this insidious Socialism which is threatening the country, and take immediate steps to expose and bring it to light. The country may truly be said to be sleeping over a veritable volcano which the next general election may precipitate, unless steps are taken at once to bring this nightmare into the light of day and force it out of its creeping nocturnal habits." MR. DUDLEY S. A. COSBY in the Westminster Review. "Many people think that it is possible to conduct a victorious campaign with the single watchword 'Down with Socialism.' Well, I am not fond of mere negatives. I do not like fighting an abstract noun. My objection to Anti-Socialism as a platform is that Socialism means so many different things. On this point I agree with Mr. Asquith. I 2 will wait before I denounce Socialism till I see what form it takes... Socialism is not necessarily synonymous with robbery. Correctly used, the word only signifies a particular view of the proper relation of the State to its citizens, a tendency to substitute public for private ownership, or to restrict the freedom of individual enterprise in the interests of the public. But there are some forms of property which we all admit should be public and not private, and the freedom of individual enterprise is already limited by a hundred laws.
    [Show full text]