-
False tweetsRumor-detection software detects, corrects erroneous claims on Twitter
A week after the Boston marathon bombing, hackers sent a bogus tweet from the official Twitter handle of the Associated Press. It read: “Breaking: Two Explosions in the White House and Barack Obama is injured.” Before the AP and White House could correct the record, the stock market responded, dropping more than 140 points in a matter of minutes. Losses mounted into the billions. The market recovered just as quickly, but analysts said the timeframe could well have been long enough for in-the-know perpetrators to profit through trading. Researchers have developed software to help society identify and correct erroneous claims on Twitter.
-
-
Terrorism & mediaExposure to media coverage of terrorist acts, disasters may cause long-term negative health effects
The city of Boston endured one of the worst terrorist attacks on U.S. soil in April of 2013, when two pressure-cooker bombs exploded near the finish line of the Boston Marathon. While emergency workers responded to the chaos and law enforcement agencies began a manhunt for the perpetrators, Americans fixed their attention to television screens, Internet news sites and forums, and Twitter, Facebook, and other social media. In doing so, some of those people may have been raising their acute stress levels which, in some cases, have been linked with long-term negative health effects. For some individuals, intense exposure to the Boston Marathon bombing through media coverage could be associated with more stress symptoms than those who had direct exposure to the attack.
-
-
Terrorism & social mediaWeighing the pros, cons of blocking ISIS’s access to social media
The Islamic State has successfully used social media to spread its ideology, share videos of beheadings, and recruit new followers. U.S. counterterrorism agencies have launched their own social media campaigns to diminish ISIS’s effects on would be jihadists, but some officials have considered whether it would be simpler to cut off ISIS from social media networks altogether. Doing so would no doubt limit ISIS’s reach on Western recruits, but could it create a challenge for officials looking to monitor the group’s activities?
-
-
Social mediaFrance asks social media companies to help in fighting radicalization, terrorism
The French government has asked leading social media and tech firms, Google, Facebook, and Twitter to work directly with French law enforcement during investigations and to immediately remove terrorist propaganda when authorities alert them to it.The Islamic State (ISIS), along with other Islamist militant groups, are using social media to disseminate their violent messages, recruit new followers and fighters, and share videos of executed hostages. Roughly 20,000 foreign fighters, including 3,400 from Western nations, have joined ISIS and other extremist groups in Syria and Iraq.
-
-
CybersecurityAssad regime employed Skype to steal military plans from moderate rebels
A FireEye report details the activities of a cyber-espionage group that stole Syrian opposition’s strategies and battle plans. To undertake this operation, the threat group employed a familiar tactic: ensnaring its victims through conversations with seemingly sympathetic and attractive women. As the conversations progressed, the “women” would offer up a personal photo, laden with malware and developed to infiltrate the target’s computer or Android phone.
-
-
Terrorism & social mediaEuropean govts. urge U.S. tech companies to remove terrorist-related postings from sites
The terror attacks in Paris have led French and German authorities to call on U.S. tech firms to help identify terrorist communications and remove hate speech from social media sites. The United Kingdom has also, for several months now, pressed Internet firms to be proactive in removing extremist content such as videos of sermons by radical Islamic preachers or recruitment material, from their sites. These recent requests for more cooperation between U.S. tech firms and European governments contrast with calls from many of the same governments who, following the Edward Snowden leaks, criticized U.S. tech firms for being too close to law enforcement agencies.
-
-
EpidemicsDisease can be monitored, predicted by analyzing views of Wikipedia articles
Scientists can now monitor and forecast diseases around the globe more effectively by analyzing views of Wikipedia articles. Researchers were able successfully to monitor influenza in the United States, Poland, Japan and Thailand, dengue fever in Brazil and Thailand, and tuberculosis in China and Thailand. They were also able to forecast all but one of these, tuberculosis in China, at least twenty-eight days in advance.
-
-
TerrorismAnalyzing how emotions ripple following terrorist events
The 2013 Boston Marathon bombing motivated mass expressions of fear, solidarity, and sympathy toward Bostonians on social media networks around the world. In a recently released study, researchers analyzed emotional reactions on Twitter in the hours and weeks following the attack. The study is the first large-scale analysis of fear and social-support reactions from geographically distant communities following a terrorist attack. The full results of the study may provide insight to governmental agencies exploring how best to handle public fear following a disruptive event.
-
-
DisastersIs social media responsible for your safety during a disaster?
Given the popularity of Facebook and Twitter, it is not surprising so many people use social media in crises such as floods, fires, and earthquakes. While social media can be a handy resource in crises, people must be careful not to take their access for granted during emergencies. Floods, fires, and earthquakes often disrupt the power and communications infrastructures that smartphones rely upon, as our access is constrained by the limitations of copper, fiber, hybrid, and cellular Internet technologies, and their vulnerability to the elements. Also, some questions about the features of tools such as Facebook’s Safety Check are yet to be answered persuasively. Still, such concerns notwithstanding, it is encouraging to see an organization such as Facebook taking responsibility for its users and entering the crisis communication space. A tool that helps family and friends during a crisis, and facilitates easy communication is a welcome development.
-
-
Terrorism & the InternetHead of U.K. surveillance agency: U.S. tech companies have become terrorists' “networks of choice”
The new director of Government Communications Headquarters (GCHQ), the U.K. intelligence organization responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces, said that privacy has never been “an absolute right.” Robert Hannigan used his first public intervention since becoming head of Britain’s surveillance agency to charge U.S. technology companies of becoming “the command and control networks of choice” for terrorists.
-
-
PrivacySocial media firms pledging to keep users anonymous still collect users’ information
Social media firm Whisperprides itself on offering anonymity in a market where the biggest players are often considered too transparent. Its co-founder, Michael Heyward, a tech entrepreneur, describes the company as “the first completely anonymous social network,” an alternative to Facebookand Twitter. It now emerges that Whisper’s back-end systems that retain digital libraries of texts and photographs sent by users, and in some cases the location information of users.
-
-
TerrorismISIS and al-Qaeda use social media, Web platforms differently to achieve different ends
The Internet has contributed to the popularity of both al-Qaeda and the Islamic State (ISIS) among would-be jihadists, but the two terror groups use social media and Web platforms differently. Al-Qaeda has been spreading its message via the Internet for nearly two decades, while ISIS is a relative newcomer. Both groups use social media to recruit fighters, but ISIS has successfully developed content that Internet users are likely to share and repost. Such content in the form of violent videos and graphic imagery target young, disillusioned Westerners who are prime for radicalization.
-
-
EbolaComputing for Ebola Challenge
Researchers at the Network Dynamics and Simulation Science Laboratory (NDSSL) have been using a combination of modeling techniques to predict the spread of the Ebola outbreak. As part of those efforts, the team created an adaptable set of global synthetic populations, allowing for rapid response as the situation continues to unfold. The synthetic populations and other informatics resources are now openly available to aid other researchers and citizen scientists. The NDSSL is hosting a Computing for Ebola Challenge from 3 October to 10 October 2014. The goal of the hackathon is to develop an application to combat the Ebola epidemic. All are welcome to join.
-
-
Social mediaPolitical traffic by Arabs on social media overwhelmingly hostile to, suspicious of U.S.
Researchers found that a great deal of the political and social traffic by Arabs on social media is deeply hostile to and suspicious of the United States. U.S. officials are concerned that Internet users in the Arab world understand history and current events in ways fundamentally different from the American version. “Suspicion and opposition to U.S. foreign policy appear to be so deep and so widely shared, even by those on opposite sides of other contentious issues, that it’s hard to imagine how the U.S. could begin to rebuild trust,” said one expert.
-
-
TerrorismState Department’s social media campaign against ISIS questioned
The State Departmentis advancing its anti-terrorism efforts on social media by reaching out to vulnerable English-speakers who could be recruited to join the Islamic State (IS). The campaign emphasizes IS’s brutality, and, mockingly, advises would-be recruits to learn “useful new skills” such as “blowing up mosques” and “crucifying and executing Muslims.” Experts say that there is a psychological error in trying to scare people off with threats that something might be exciting and thrilling. “If you challenge a young adult, particularly a male, with the fact that something might be especially difficult or challenging, you’re just exciting them,” says an expert in the psychology of terrorists.
-