Broadening the GIFCT Hash-Sharing Database Taxonomy: an Assessment and Recommended Next Steps

Total Page:16

File Type:pdf, Size:1020Kb

Broadening the GIFCT Hash-Sharing Database Taxonomy: an Assessment and Recommended Next Steps Broadening the GIFCT Hash-Sharing Database Taxonomy: An Assessment and Recommended Next Steps July 2021 Acknowledgements The Global Internet Forum to Counter Terrorism would like to thank all of our stakeholders and partners for their interest in and commitment to this body of work. We are especially grateful to our GIFCT member companies, members of our Independent Advisory Committee (IAC), and civil society representatives for their feedback throughout this process, as well as to the GIFCT interns—Maggie Frankel, Aaron Tielemans, and Ye Bin Won—who provided significant support in the production of this series. GIFCT is also enormously appreciative of the time, expertise, and innovative thinking that all of the authors of the subsequent papers contributed to this project. Table of Contents Introduction 4 Nicholas J. Rasmussen and Johannah Lowin Background: A Guide to the Taxonomy of GIFCT’s Hash-Sharing Database 9 GIFCT Staff Practical and Technical Considerations in Expanding the GIFCT Hash-Sharing Database 12 Erin Saltman and Tom Thorley Expanding the Hash-Sharing Database 25 Daniel Byman and Chris Meserole Dynamic Matrix of Extremisms and Terrorism (DMET): A Continuum Approach Towards Identifying Different Degrees of Extremisms 42 Marten Risius, Kevin M. Blasiak, Susilo Wibisono, Rita Jabri-Markwell, and Winnifred Louis A Taxonomy for the Classification of Post-Organizational Violent Extremist and Terrorist Content 78 Jacob Davey, Milo Comerford, Jakob Guhl, Will Baldet, and Chloe Colliver A Practical Taxonomy for Online Terrorist Content 102 William Braniff, Matthew Feldman, Eviane Leidig, Adam Hadley, Ghayda Hassan, Ray Serrato Taxonomy Expansion and the Global Terrorism Database: Effectively Leveraging Academic Data Collection Initiatives 116 Erin Miller Defining and Classifying Terrorist Content Online: Leveraging National Countering Violent Extremism Strategies and Action Plans 128 Sara Zeiger, Farangiz Atamuradova, Denis Suljic, and Petra Regeni Conclusion & Initial Next Steps 150 GIFCT Staff Appendix: Definitions of Terrorism & Violent Extremism 154 Nayanka Paquete Perdigao, Sarah Kenny, and Aaron Tielemans 3 Introduction By Nicholas J. Rasmussen and Johannah Lowin Broadening the GIFCT Hash-Sharing Database Taxonomy: An Assessment and Recommended Next Steps Introduction By Nicholas J. Rasmussen and Johannah Lowin Anders Breivik’s 1,518-page document released prior to the killing of 77 people at a government center and summer camp in Oslo, Norway in 2011. Brenton Tarrant’s essay published before the mass shooting of 55 people at two mosques during Friday prayer in Christchurch, New Zealand in 2019. Patrick Crusius’s tract posted before the massacre of 23 people at the Walmart in El Paso, Texas later that year. All three of these detailed online manifestos are widely recognized as terrorist and violent extremist propaganda and disseminated among online sympathizers and members of white supremacy groups. Yet none of these writings — though they incite and inspire violence1 — currently qualifies for inclusion in the Global Internet Forum to Counter Terrorism’s hash- sharing database of terrorist and violent extremist content. The reason for this is twofold: First, when several leading tech companies came together five years ago to establish the hash-sharing database, they agreed to include hashes of only a narrow subset of content. To find common ground, the original scope of the database was limited to material associated with organizations on the United Nations Security Council’s Consolidated Sanctions List. In practice, that meant that nearly all hashes reflected content related to al-Qaeda, the Taliban, the Islamic State, or other groups that the United Nations had designated as terrorist organizations. As writings penned and published by far-right extremist attackers, none of the above manifestos met those criteria. Second, the database in its current form only includes hashes of images or video and not PDF documents, which is how manifestos tend to surface and circulate online. Although the database has evolved over time to include hashes of content related to three specific attacks that have triggered GIFCT’s Content Incident Protocol — a set of procedures developed to hasten the removal of content from a live-streamed event — that does not include PDFs.2 As a result, while hashes of perpetrator-produced video footage of the devastating Christchurch attacks can be shared among members in the database, hashes of the perpetrator’s manifesto — which the El Paso shooter cited as direct inspiration several months later — cannot. 1 Like many such manifestos, the three mentioned here go so far as to feature detailed instructions for others to follow and/or careful reasoning for specific tactical choices. 2 In order for a CIP to be activated, all four of the following conditions must be met: 1) a real-world terrorist, violent extremist, or mass violence event; 2) has been recorded or broadcast via livestream; 3) depicting murder or attempted murder; and 4) is being distributed on GIFCT member platforms or so broadly online that such distribution appears inevitable. Since the attacks in Christchurch, New Zealand in March 2019 initiated the creation of the CIP process, GIFCT has activated the CIP twice in response to offline attacks when perpetrator-produced content was shared on GIFCT member platforms: in Halle, Germany in October 2019 and in Glendale, Arizona in May 2020. 5 Unfortunately, the lifecycle of a terrorist manifesto rarely ends with the attack. Instead, these writings become like “the baton in a relay race of extremists, passed from one terrorist murderer to the next through online communities.”3 For instance, Tarrant’s manifesto cited Breivik’s attack as an inspiration and also claimed knowledge of manifestos by other far-right extremists, such as Dylann Roof, the perpetrator of the Charleston, South Carolina church shooting in 2015.4 Following the Christchurch attack, Tarrant’s manifesto was subsequently cited by Crusius, the El Paso shooter,5 and an unnamed Singaporean teenage far-right extremist whose attack was foiled by authorities.6 This pattern is common throughout the far-right extremist milieu as terrorist manifestos often cite, credit, and praise predecessors. Allowing terrorist manifestos to proliferate across the internet — unfettered and readily accessible — therefore contributes to the violent extremist culture of citation and heightens the risk of future attacks. A Rights-Based, Multi-Stakeholder Approach: Manifestos are but one example of the sort of harmful content linked to terrorism and violent extremism that GIFCT’s hash-sharing database can and must evolve to address. One year ago, at the first Global Summit of the newly independent GIFCT, our team committed to leading a global multi-stakeholder effort to explore how to expand the hash-sharing database’s utility, reach, and impact. As part of this year-long initiative, GIFCT put human rights — including, but not limited to, freedom of speech and privacy — at the forefront of the process. At the advice of key civil society stakeholders involved in a range of GIFCT work and initiates, GIFCT engaged the firm Business for Social Responsibility (BSR) to undertake a forward-looking human rights impact assessment of the organization at this foundational moment. The recommendations in that report, released in full last week, helped shape and inform every element of this effort. Chief among the report’s findings was a widespread view among our stakeholder community that the narrow scope of the database reflects broader discrimination and bias in the counterterrorism field, specifically a disproportionate focus on Islamist extremist content rather than white supremacist content.7 Indeed, the assessment identified GIFCT’s review of the hash-sharing database’s taxonomy as a key opportunity “to proactively address bias in the counterterrorism field.”8 As GIFCT increasingly aims to focus on behavior and content, in addition to dangerous individuals and organizations, this project seeks to do 3 J.M. Berger, “The Strategy of Violent White Supremacy is Evolving,” The Atlantic, August 7, 2019. 4 Ari Ben Am and Gabriel Weinman, “Fabricated Martyrs: The Warrior-Saint Icons of Far-Right Terrorism,” Perspectives on Terrorism 14, no. 5 (October 2020): 140. 5 Jacob Ware, “Testament to Murder: The Violent Far-Right’s Increasing Use of Terrorist Manifestos,” ICCT, March 20, 2020. 6 Max Walden, “Singaporean teenager arrested for allegedly planning Christchurch-inspired machete attack on mosques,” ABC News, June 27, 2021, Link 7 “Human Rights Assessment: Global Internet Forum to Counter Terrorism,” Business for Social Responsibility, 2021. 8 Business for Social Responsibility, “Human Rights Assessment,” 26. 6 Broadening the GIFCT Hash-Sharing Database Taxonomy: An Assessment and Recommended Next Steps just that. The Series The first piece in this collection, “Practical and Technical Considerations in Expanding the GIFCT Hash-Sharing Database,” offers a practical lens through which to view the insights and recommendations from the independent academic papers that follow. Co- authored by GIFCT Director of Programming Erin Saltman and Director of Technology Tom Thorley, this chapter draws on a series of interviews with each GIFCT member to review the technical feasibility of various approaches to expansion. As our diverse array of members must ultimately be able to implement an expanded taxonomy in order for it to be valuable, this initial chapter outlines the
Recommended publications
  • AAS Worldwide Telescope: Seamless, Cross-Platform Data Visualization Engine for Astronomy Research, Education, and Democratizing Data
    AAS WorldWide Telescope: Seamless, Cross-Platform Data Visualization Engine for Astronomy Research, Education, and Democratizing Data The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Rosenfield, Philip, Jonathan Fay, Ronald K Gilchrist, Chenzhou Cui, A. David Weigel, Thomas Robitaille, Oderah Justin Otor, and Alyssa Goodman. 2018. AAS WorldWide Telescope: Seamless, Cross-Platform Data Visualization Engine for Astronomy Research, Education, and Democratizing Data. The Astrophysical Journal: Supplement Series 236, no. 1. Published Version https://iopscience-iop-org.ezp-prod1.hul.harvard.edu/ article/10.3847/1538-4365/aab776 Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:41504669 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP Draft version January 30, 2018 Typeset using LATEX twocolumn style in AASTeX62 AAS WorldWide Telescope: Seamless, Cross-Platform Data Visualization Engine for Astronomy Research, Education, and Democratizing Data Philip Rosenfield,1 Jonathan Fay,1 Ronald K Gilchrist,1 Chenzhou Cui,2 A. David Weigel,3 Thomas Robitaille,4 Oderah Justin Otor,1 and Alyssa Goodman5 1American Astronomical Society 1667 K St NW Suite 800 Washington, DC 20006, USA 2National Astronomical Observatories, Chinese Academy of Sciences 20A Datun Road, Chaoyang District Beijing, 100012, China 3Christenberry Planetarium, Samford University 800 Lakeshore Drive Birmingham, AL 35229, USA 4Aperio Software Ltd. Headingley Enterprise and Arts Centre, Bennett Road Leeds, LS6 3HN, United Kingdom 5Harvard Smithsonian Center for Astrophysics 60 Garden St.
    [Show full text]
  • XAMARIN.FORMS for BEGINNERS ABOUT ME Tom Soderling Sr
    XAMARIN.FORMS FOR BEGINNERS ABOUT ME Tom Soderling Sr. Mobile Apps Developer @ Polaris Industries; Ride Command Xamarin.Forms enthusiast DevOps hobbyist & machine learning beginner 4 year XCMD Blog: https://tomsoderling.github.io GitHub: https://github.com/TomSoderling Twitter: @tomsoderling How Deep Pickster Spaniel Is It? THE PLAN • Introduction: Why, What, and When • Overview of Xamarin.Forms Building Blocks • Building a Xamarin.Forms UI in XAML • Data Binding • View Customization • Next Steps & Resources • Please ask any questions that come up! THE PLAN • Introduction: Why, What, and When • Overview of Xamarin.Forms Building Blocks • Building a Xamarin.Forms UI in XAML • Data Binding • View Customization • Next Steps & Resources INTRODUCTION : WHY • WET: the soggy state of mobile app development • Write Everything Twice INTRODUCTION : WHY • WET: the soggy state of mobile app development • Write Everything Twice INTRODUCTION : WHAT • What is Xamarin.Forms? • Cross-platform UI framework • Platforms: • Mobile: iOS 8 and up, Android 4.0.3 (API 15) • Desktop: Windows 10 UWP, MacOS, WFP • Samsung Smart Devices: Tizen INTRODUCTION : WHAT • Brief History: • May 2011, Xamarin founded • MonoTouch and Mono for Android using MonoDevelop IDE • February 2013, release of Xamarin 2.0 • Xamarin Studio IDE & integration with Visual Studio • Renamed to Xamarin.Android and Xamarin.iOS • May 2014, Xamarin.Forms released as part of Xamarin 3 • February 24 2016, Xamarin acquired by Microsoft • Owned, actively developed on, and supported by Microsoft • Free
    [Show full text]
  • Download Download
    Proceedings of the Fifteenth International AAAI Conference on Web and Social Media (ICWSM 2021) A Large Open Dataset from the Parler Social Network Max Aliapoulios1, Emmi Bevensee2, Jeremy Blackburn3, Barry Bradlyn4, Emiliano De Cristofaro5, Gianluca Stringhini6, Savvas Zannettou7 1New York University, 2SMAT, 3Binghamton University, 4University of Illinois at Urbana-Champaign, 5University College London, 6Boston University, 7Max Planck Institute for Informatics [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract feasible in technical terms to create a new social media plat- Parler is as an “alternative” social network promoting itself form, but marketing the platform towards specific polarized as a service that allows to “speak freely and express yourself communities is an extremely successful strategy to bootstrap openly, without fear of being deplatformed for your views.” a user base. In other words, there is a subset of users on Twit- Because of this promise, the platform become popular among ter, Facebook, Reddit, etc., that will happily migrate to a new users who were suspended on mainstream social networks platform, especially if it advertises moderation policies that for violating their terms of service, as well as those fearing do not restrict the growth and spread of political polariza- censorship. In particular, the service was endorsed by several tion, conspiracy theories, extremist ideology, hateful and vi- conservative public figures, encouraging people to migrate olent speech, and mis- and dis-information. from traditional social networks. After the storming of the US Capitol on January 6, 2021, Parler has been progressively de- Parler.
    [Show full text]
  • The Radical Roots of the Alt-Right
    Gale Primary Sources Start at the source. The Radical Roots of the Alt-Right Josh Vandiver Ball State University Various source media, Political Extremism and Radicalism in the Twentieth Century EMPOWER™ RESEARCH The radical political movement known as the Alt-Right Revolution, and Evolian Traditionalism – for an is, without question, a twenty-first century American audience. phenomenon.1 As the hipster-esque ‘alt’ prefix 3. A refined and intensified gender politics, a suggests, the movement aspires to offer a youthful form of ‘ultra-masculinism.’ alternative to conservatism or the Establishment Right, a clean break and a fresh start for the new century and .2 the Millennial and ‘Z’ generations While the first has long been a feature of American political life (albeit a highly marginal one), and the second has been paralleled elsewhere on the Unlike earlier radical right movements, the Alt-Right transnational right, together the three make for an operates natively within the political medium of late unusual fusion. modernity – cyberspace – because it emerged within that medium and has been continuously shaped by its ongoing development. This operational innovation will Seminal Alt-Right figures, such as Andrew Anglin,4 continue to have far-reaching and unpredictable Richard Spencer,5 and Greg Johnson,6 have been active effects, but researchers should take care to precisely for less than a decade. While none has continuously delineate the Alt-Right’s broader uniqueness. designated the movement as ‘Alt-Right’ (including Investigating the Alt-Right’s incipient ideology – the Spencer, who coined the term), each has consistently ferment of political discourses, images, and ideas with returned to it as demarcating the ideological territory which it seeks to define itself – one finds numerous they share.
    [Show full text]
  • Building Resilience & Confronting Risk In
    BUILDING RESILIENCE & CONFRONTING RISK IN THE COVID-19 ERA A PARENTS & CAREGIVERS GUIDE TO ONLINE RADICALIZATION POLARIZATION AND EXTREMISM RESEARCH AND INNOVATION LAB (PERIL) PERIL brings the resources and expertise of the university sector to bear CONTENTS on the problem of growing youth polarization and extremist radicalization, through scalable research, intervention, and public education ideas to PARENT & CAREGIVER GUIDE 3 reduce rising polarization and hate. WHAT IS ONLINE RADICALIZATION? WHY SHOULD YOU CARE? 4 SOUTHERN POVERTY LAW CENTER NEW RISKS IN THE COVID-19 ERA 5 The SPLC seeks to be a catalyst for racial justice in the South and RECOGNIZING WARNING SIGNS 6 beyond, working in partnership with communities to dismantle white UNDERSTANDING THE DRIVERS 7 supremacy, strengthen intersectional movements, and advance the ENGAGE AND EMPOWER 9 human rights of all people. RESPONDING TO HATE 11 HOW TO GET HELP 12 APPENDIX: STAYING ALERT TO SITES, PLATFORMS AND APPS FREQUENTLY EXPLOITED BY EXTREMISTS 17 ENDNOTES 19 CREDITS 20 ILLUSTRATIONS BY CLAUDIA WHITAKER PARENT & CAREGIVER GUIDE Who is this guide for? We wrote this guide with a wide Whether you live with a young person, or work virtually range of caregivers in mind. with youth, radicalization to extremism is something we all should be concerned about. Extremists looking Caregivers living with children and young adults. This to recruit and convert children are predatory. Like all includes parents, grandparents, foster parents, extended forms of child exploitation, extremist recruitment drives families, and residential counselors who are the a wedge between young people and the adults they would guardians and caregivers of children and youth living typically trust.
    [Show full text]
  • Licensing Information User Manual Release 9.1 F13415-01
    Oracle® Hospitality Cruise Fleet Management Licensing Information User Manual Release 9.1 F13415-01 August 2019 LICENSING INFORMATION USER MANUAL Oracle® Hospitality Fleet Management Licensing Information User Manual Version 9.1 Copyright © 2004, 2019, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error- free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Abstract Book
    12th Annual International Conference on Communication and Mass Media, 12-15 May, Athens, Greece: 2014 Abstract Book Communication & Mass Media Abstracts Twelfth Annual International Conference on Communication and Mass Media 12-15 May 2014, Athens, Greece Edited by Gregory T. Papanikos THE ATHENS INSTITUTE FOR EDUCATION AND RESEARCH 1 12th Annual International Conference on Communication and Mass Media, 12-15 May, Athens, Greece: Abstract Book 2 12th Annual International Conference on Communication and Mass Media, 12-15 May, Athens, Greece: Abstract Book Communication & Mass Media Abstracts 12th Annual International Conference on Communication and Mass Media 12-15 May 2014, Athens, Greece Edited by Gregory T. Papanikos 3 12th Annual International Conference on Communication and Mass Media, 12-15 May, Athens, Greece: Abstract Book First Published in Athens, Greece by the Athens Institute for Education and Research. ISBN: 978-618-5065-38-6 All rights reserved. No part of this publication may be reproduced, stored, retrieved system, or transmitted, in any form or by any means, without the written permission of the publisher, nor be otherwise circulated in any form of binding or cover. 8 Valaoritou Street Kolonaki, 10671 Athens, Greece www.atiner.gr ©Copyright 2014 by the Athens Institute for Education and Research. The individual essays remain the intellectual properties of the contributors. 4 12th Annual International Conference on Communication and Mass Media, 12-15 May, Athens, Greece: Abstract Book TABLE OF CONTENTS (In Alphabetical Order
    [Show full text]
  • Ron Reagan Does Not Consider Himself an Activist
    Photoshop # White Escaping from my Top winners named ‘Nothing Fails father’s Westboro in People of Color Like Prayer’ contest Baptist Church student essay contest winners announced PAGES 10-11 PAGE 12-16 PAGE 18 Vol. 37 No. 9 Published by the Freedom From Religion Foundation, Inc. November 2020 Supreme Court now taken over by Christian Nationalists President Trump’s newly confirmed Supreme Court Justice Amy Coney Barrett is going to be a disaster for the constitutional prin- ciple of separation between state and church and will complete the Christian Nationalist takeover of the high court for more than a generation, the Freedom From Religion Foundation asserts. Barrett’s biography and writings reveal a startling, life-long allegiance to religion over the law. The 48-year-old Roman Catholic at- tended a Catholic high school and a Presby- terian-affiliated college and then graduated from Notre Dame Law School, where she Photo by David Ryder taught for 15 years. She clerked for archcon- Amy Coney Barrett Despite his many public statements on atheism, Ron Reagan does not consider himself an activist. servative Justice Antonin Scalia, and signifi- cantly, like the late justice, is considered an “originalist” or “textual- ist” who insists on applying what is claimed to be the “original intent” of the framers. She and her parents have belonged to a fringe con- servative Christian group, People of Praise, which teaches that hus- Ron Reagan — A leading bands are the heads of household. Barrett’s nomination hearing for a judgeship on the 7th U.S. Circuit Court of Appeals, where she has served for less than three years, documented her many controversial figure of nonbelievers and disturbing positions on religion vis-à-vis the law.
    [Show full text]
  • Hate Speech, Pseudonyms, the Internet, Impersonator Trolls, and Fake Jews in the Era of Fake News
    The Ohio State Technology Law Journal WEB OF LIES: HATE SPEECH, PSEUDONYMS, THE INTERNET, IMPERSONATOR TROLLS, AND FAKE JEWS IN THE ERA OF FAKE NEWS YITZCHAK BESSER1 This Article discusses the problem of “hate-speech impersonator trolls,” that is, those who impersonate minorities through the use of false identities online, and then use those false identities to harm those minorities through disinformation campaigns and false-flag operations. Solving this problem requires a change to the status quo, either through the passage of a new statute targeting hate-speech impersonator trolls or through the modification of Section 230 of the Communications Decency Act. In this Article, I discuss the scope and severity of hate- speech impersonator-trolling, as well as relevant jurisprudence on the First Amendment, hate speech, anonymity, and online communications. I then present proposals and recommendations to counter and combat hate-speech impersonator trolls. CONTENTS I. INTRODUCTION .............................................................. 234 II. IMPERSONATION AS A FORM OF HATE SPEECH ...... 236 III. FIRST AMENDMENT JURISPRUDENCE ...................... 244 1 The author is a term law clerk for Senior U.S. District Judge Glen H. Davidson of the Northern District of Mississippi. He graduated magna cum laude from the University of Baltimore School of Law in May 2020. He is grateful to Professors Jerry "Matt" Bodman and Phillip J. Closius for their advice during the writing and editing process. 234 THE OHIO STATE TECHNOLOGY LAW JOURNAL [Vol.
    [Show full text]
  • Covid-19 Disinformation Briefing No. 2 Far-Right Mobilisation
    COVID-19 DISINFORMATION BRIEFING NO. 2 FAR-RIGHT MOBILISATION 9th April 2020 This is the second in a series of briefings from ISD’s Digital Research Unit on the information ecosystem around coronavirus (COVID-19). These briefings expose how technology platforms are being used to promote disinformation, hate, extremism and authoritarianism in the context of COVID-19. It is based on ISD’s mixture of natural language processing, network analysis and ethnographic online research. This briefing focuses on the way far-right groups and individuals are mobilising around COVID-19 in the US. The first briefing in the series can be found on ISD’s website. Top Lines Far-right groups and individuals are opportunistically using the ongoing pandemic to advance their movements and ideologies: - COVID-19 is an increasingly important topic within far-right communities. Mentions of ‘corona-chan’, a slang term for COVID-19 popular with far-right groups and individuals have increased significantly across mainstream and fringe social media platforms. - COVID-19 is being used as a ‘wedge issue’ to promote conspiracy theories, target minority communities, and call for extreme violence. COVID-19 is being used to advance calls for the ‘boogaloo’ – an extreme right-wing meme referring to an impending civil war: - While some of these calls appear to be ironic, others should be recognised as legitimate security threats. - Discussions of the ‘boogaloo’ are increasingly pivoting towards the ways the COVID- 19 pandemic provides an opportunity for violence. - This conversation is taking place across mainstream and fringe social media. - This trend has already manifested into real-world violence, with one alleged white supremacist terrorist dying after shootouts with the FBI.
    [Show full text]
  • How Public Universities React to Alt-Right Speakers By
    Towson University Office of Graduate Studies Responding to Hate: How Public Universities React to Alt-Right Speakers by Josh Guttman A thesis Presented to the faculty of Towson University Office of Graduate Studies In partial fulfillment of the requirements for the degree Masters of Science in Communications Management Department of Communication Towson University Towson, Maryland 21252 (December, 2018) DEDICATION This thesis is dedicated to my mom and dad, who supported me and cheered me on when I needed it most. I love you both and I can’t thank you enough. I made it through the Paper Chase (1973). *Rocky (1976) music swells in the background* RESPONDING TO HATE ii RESPONDING TO HATE iii Abstract This study examined how public universities who have hosted alt-right speakers on campus protected their reputations while also fostering a free speech environment and keeping students safe. Due to the First Amendment policies of public universities, they have a greater obligation to provide alt-right speakers a platform. However, alt-right speaking events pose risks among the university community such as violence and vandalism. These risks could potentially damage the reputation of the university. Through utilizing Situational Crisis Communication Theory (SCCT) and gathering primary documents from the universities, this study showcases the effectiveness of university strategies in regards to balancing a first amendment while maintaining student safety. The results showed university strategies that were in-line with SCCT were more effective at maintaining their reputations and keeping students safe. Hosting events dedicated to university values and engaging in the community protected their reputations leading up to and during the alt-right speaking events.
    [Show full text]
  • Microsoft 2012 Citizenship Report
    Citizenship at Microsoft Our Company Serving Communities Working Responsibly About this Report Microsoft 2012 Citizenship Report Microsoft 2012 Citizenship Report 01 Contents Citizenship at Microsoft Serving Communities Working Responsibly About this Report 3 Serving communities 14 Creating opportunities for youth 46 Our people 85 Reporting year 4 Working responsibly 15 Empowering youth through 47 Compensation and benefits 85 Scope 4 Citizenship governance education and technology 48 Diversity and inclusion 85 Additional reporting 5 Setting priorities and 16 Inspiring young imaginations 50 Training and development 85 Feedback stakeholder engagement 18 Realizing potential with new skills 51 Health and safety 86 United Nations Global Compact 5 External frameworks 20 Supporting youth-focused 53 Environment 6 FY12 highlights and achievements nonprofits 54 Impact of our operations 23 Empowering nonprofits 58 Technology for the environment 24 Donating software to nonprofits Our Company worldwide 61 Human rights 26 Providing hardware to more people 62 Affirming our commitment 28 Sharing knowledge to build capacity 64 Privacy and data security 8 Our business 28 Solutions in action 65 Online safety 8 Where we are 67 Freedom of expression 8 Engaging our customers 31 Employee giving and partners 32 Helping employees make 69 Responsible sourcing 10 Our products a difference 71 Hardware production 11 Investing in innovation 73 Conflict minerals 36 Humanitarian response 74 Expanding our efforts 37 Providing assistance in times of need 76 Governance 40 Accessibility 77 Corporate governance 41 Empowering people with disabilities 79 Maintaining strong practices and performance 42 Engaging students with special needs 80 Public policy engagement 44 Improving seniors’ well-being 83 Compliance Cover: Participants at the 2012 Imagine Cup, Sydney, Australia.
    [Show full text]