The Virginia Tech shooting in 2007 was the deadliest school shooting in U.S. history, with 32 people killed and 17 injured. The shooter, Seung-Hui Cho, was a Virginia Tech student who had previously been diagnosed with a severe mental illness. The attacks sparked debates around gun control laws, mental health treatment, and the responsibility of colleges. They also led to criticism of media organizations that aired portions of the shooter's manifesto. In the aftermath, efforts increased to allow concealed carry of firearms on college campuses, though most states continue to ban guns at schools.
Wikileaks and Facebook represent two different approaches to new media in the 21st century. Wikileaks, founded by Julian Assange, aims to make government and corporate documents publicly available to increase transparency, whereas Facebook, founded by Mark Zuckerberg, is a social media platform that connects individuals. Both sites have experienced rapid growth but also criticism - Wikileaks for its radical approach to sharing secrets, and Facebook for issues around privacy and data use. Overall the document analyzes how these groups exemplify differing views of new media's role in society.
This document provides a comprehensive overview of pornography and its impact on society. It begins by defining pornography, child pornography, and related terms. It then examines the growth of the pornography industry, noting how advances in technology have allowed it to expand massively. The industry now focuses on increasingly extreme and violent content to drive profits. Child pornography is also discussed, highlighting how it is produced and consumed for different motivations than adult pornography. The document aims to cover key issues related to pornography's influence on various aspects of the criminal justice system.
The document discusses the evolution of the internet in China and its impact on political participation. It argues that contrary to expectations, the Chinese government has been largely successful in controlling the internet within its borders. However, it also notes that "human flesh search engines" have allowed Chinese netizens to conduct online investigations that expose corruption and hold officials accountable. While this form of "internet justice" operates within the limits tolerated by the authoritarian state, it has been an effective means for citizens to enact change and exert political influence where the traditional legal system has failed to curb abuses of power.
Talk on fake news as digital culture given at the Institute for Policy Research symposium on Politics, Fake News and the Post-Truth Era, University of Bath, 14 September 2017.
More about the talk here: http://lilianabounegru.org/2017/09/23/fake-news-in-digital-culture-at-2017-institute-for-policy-research-symposium/
More about the event here: http://www.bath.ac.uk/events/politics-fake-news-and-the-post-truth-era/
Fake News, Algorithmic Accountability and the Role of Data Journalism in the ...Liliana Bounegru
Talk given at the workshop 'How Can Public Interest Journalism Hold Algorithms to Account?' at the University of Cambridge on 23 March 2017.
More about the talk can be found here: http://lilianabounegru.org/2017/03/27/fake-news-algorithmic-accountability-data-journalism-post-truth-university-of-cambridge/
More about the workshop can be found here: http://www.crassh.cam.ac.uk/events/27130
The Virginia Tech shooting in 2007 was the deadliest school shooting in U.S. history, with 32 people killed and 17 injured. The shooter, Seung-Hui Cho, was a Virginia Tech student who had previously been diagnosed with a severe mental illness. The attacks sparked debates around gun control laws, mental health treatment, and the responsibility of colleges. They also led to criticism of media organizations that aired portions of the shooter's manifesto. In the aftermath, efforts increased to allow concealed carry of firearms on college campuses, though most states continue to ban guns at schools.
Wikileaks and Facebook represent two different approaches to new media in the 21st century. Wikileaks, founded by Julian Assange, aims to make government and corporate documents publicly available to increase transparency, whereas Facebook, founded by Mark Zuckerberg, is a social media platform that connects individuals. Both sites have experienced rapid growth but also criticism - Wikileaks for its radical approach to sharing secrets, and Facebook for issues around privacy and data use. Overall the document analyzes how these groups exemplify differing views of new media's role in society.
This document provides a comprehensive overview of pornography and its impact on society. It begins by defining pornography, child pornography, and related terms. It then examines the growth of the pornography industry, noting how advances in technology have allowed it to expand massively. The industry now focuses on increasingly extreme and violent content to drive profits. Child pornography is also discussed, highlighting how it is produced and consumed for different motivations than adult pornography. The document aims to cover key issues related to pornography's influence on various aspects of the criminal justice system.
The document discusses the evolution of the internet in China and its impact on political participation. It argues that contrary to expectations, the Chinese government has been largely successful in controlling the internet within its borders. However, it also notes that "human flesh search engines" have allowed Chinese netizens to conduct online investigations that expose corruption and hold officials accountable. While this form of "internet justice" operates within the limits tolerated by the authoritarian state, it has been an effective means for citizens to enact change and exert political influence where the traditional legal system has failed to curb abuses of power.
Talk on fake news as digital culture given at the Institute for Policy Research symposium on Politics, Fake News and the Post-Truth Era, University of Bath, 14 September 2017.
More about the talk here: http://lilianabounegru.org/2017/09/23/fake-news-in-digital-culture-at-2017-institute-for-policy-research-symposium/
More about the event here: http://www.bath.ac.uk/events/politics-fake-news-and-the-post-truth-era/
Fake News, Algorithmic Accountability and the Role of Data Journalism in the ...Liliana Bounegru
Talk given at the workshop 'How Can Public Interest Journalism Hold Algorithms to Account?' at the University of Cambridge on 23 March 2017.
More about the talk can be found here: http://lilianabounegru.org/2017/03/27/fake-news-algorithmic-accountability-data-journalism-post-truth-university-of-cambridge/
More about the workshop can be found here: http://www.crassh.cam.ac.uk/events/27130
The document summarizes the main arguments made by cyber-utopians regarding how the internet would undermine authoritarian governments and spread democracy and dissent. It then outlines three main ways that authoritarian governments have adapted to use the internet to their advantage: (1) spreading propaganda through "spinternet" sites, (2) generating useful information and legitimacy through "authoritarian deliberation" sites that allow some criticism, and (3) closely monitoring the internet to identify dissent early through advanced surveillance technologies. Overall, the document argues that authoritarian governments have been able to use the internet in nuanced ways to maintain and even strengthen their control.
Federal documents detailing the attacks at the U.S. Capitol show a mix of FBI techniques, from license plate readers to facial recognition, that helped identify rioters. Digital rights activists say the invasive technology can infringe on our privacy.
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...Axel Bruns
This document summarizes research analyzing the sharing of links to "fake news" domains on Facebook from 2016 to 2021. The researchers collected data on over 40 million Facebook posts linking to over 1,500 questionable news domains. They analyzed the network of pages and groups sharing these links, finding clusters aligned with topics like progressives, conservatives, and conspiracy theories. They also analyzed how posts spread between pages, finding international communities focused on issues like climate change, vaccines, and politics. The research aims to understand the spread of problematic information on Facebook over time and across different communities.
Facebook has a policy prohibiting praise or support of events they deem violate standards, but as internet providers are shielded from liability for user content by Section 230, they have no obligation to censor. However, social media CEOs are censoring accounts that don't conform to their views, like former President Trump for allegedly fomenting the January 6 riot. While people should be responsible for their own actions, social media censoring violates free speech. No one has a monopoly on truth, and social media shouldn't act as arbiters of acceptable views. Congress could repeal Section 230 protections if platforms censor, or CEOs should enable free exchange of all information and viewpoints.
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
Metanomics is a weekly Web-based show on the serious uses of virtual worlds. This transcript is from a past show.
For this and other videos, visit us at http://metanomics.net.
The document discusses the debate around whether pornography is beneficial or detrimental to society. It outlines arguments on both sides of the debate. Proponents argue that pornography can fulfill sexual desires and reduce other criminal behaviors like rape. However, critics argue that pornography can degrade perceptions of women, promote unrealistic expectations, and contribute to relationship problems. The document also notes that the pornography industry is very large and lucrative. Overall, the document explores both the potential positive and negative impacts of pornography on society.
This document discusses the history and legal framework of freedom of speech in the United States. It outlines key Supreme Court cases that have established precedents, including Schenck v. United States which introduced the "clear and present danger" test, and Marsh v. Alabama which established that the First Amendment can apply to private property serving as a public forum. The document then examines questions around whether social media sites can legally censor speech and whether Section 230 or the Constitution need updating to address the role of modern internet platforms.
This document discusses the issue of censorship and provides several examples. It argues that censorship threatens freedom of expression and prevents important ideas from being shared. While censorship has existed throughout history, the Comstock Act of 1873 set the precedent for banning literature deemed sexually inappropriate in the US. The document also discusses several court cases around banning books in schools, including a landmark 1982 Supreme Court case that found students' civil rights were violated by a school board banning books. It notes that while censorship continues to be an issue, groups are working to prevent book banning and the internet has made it harder to censor ideas.
Major social media platforms like Facebook and Twitter have increasingly censored certain types of political speech, threatening democracy and freedom of expression. They determine what information reaches the public and can manipulate people's political views. Recently Twitter banned then-President Trump's account and Apple/Google removed conservative social network Parler from their app stores, showing these companies' growing power to control the flow of information and ideas. If left unchecked, monopolistic tech giants could end up dictating political discourse and limiting individuals' ability to make their own judgments about what to read and believe.
PRISM is a secret NSA program that collects intelligence from major tech companies like Google and Facebook. It allows analysts access to emails, chats, photos, and other data from foreigners using these services. While the NSA claims PRISM only targets non-US persons abroad, it may also incidentally collect some data on Americans due to large amounts of foreign data being routed through US servers. The program is conducted under Section 702 of the FISA Amendments Act but was leaked to the public by Edward Snowden.
Confessions (and Lessons) of a "Recovering" Data Brokermetanautix
The document discusses responsible innovation in big data and privacy. It summarizes that as data and analytics have increased exponentially, so have issues around privacy, surveillance, and the imbalance of power between individuals and large organizations with access to personal data. The author provides examples of how privacy is culturally dependent and discusses challenges around regulating new technologies and balancing individual rights with security and innovation.
Evgeny Morozov presented a document that discusses how the internet and digital technologies are impacting society and politics in different ways around the world. Some key points made include that the internet has been both praised as enabling the spread of freedom and democracy, but also criticized as enabling more control and censorship by authoritarian governments. New digital tools are allowing new forms of both political activism and control over information. The impact of these technologies depends on how they are used and the context of different countries.
1) Social networking sites collect and share large amounts of personal information provided by users, which can be pieced together to determine identities and private details like Social Security numbers.
2) A study found that over 60% of student Facebook profiles disclosed enough personal details that could be used by fraudsters instead of credit reports.
3) Researchers were able to predict the full 9-digit Social Security numbers of 8.5% of Americans born between 1989-2003 just based on publicly available information online.
The document discusses the history and techniques of hacktivism as well as key hacktivist groups and their actions. It also covers the evolution of online political campaigning in the US and the increasing role of the internet in elections. Finally, it defines e-government and outlines the historical development of e-government initiatives in the US.
1) The Broken Windows Theory asserts that addressing minor crimes and disorder prevents more serious crimes. Commissioner William Bratton popularized broken windows policing in New York City in the 1990s, reducing crime.
2) In the 1970s, New Jersey launched a program to improve communities that increased residents' sense of security, though police were skeptical. Broken windows policing aimed to address small issues before they escalated.
3) Zero-tolerance policies, beginning in New York City in 1994, strictly enforced all laws without discretion. While crime dropped, the tactics eroded police-community relations and faced accusations of racial profiling.
This document discusses the history and development of internet pornography from its origins in the early 1990s through bulletin board systems to the present day. It defines pornography and outlines the timeline from the early 1990s when the internet became publicly available to developments like improved streaming media in the 2000s. The document also examines benefits like technological innovations, potential links to reduced crimes, and legal issues around censorship, child pornography, and varying laws globally. In conclusion, it suggests that while internet pornography has downsides, the technologies and economic benefits it has enabled outweigh these issues.
Pivoting off Jay Rosen's definition of citizen journalism, this presentation draws on Steve Outing's "11 Layers of Citizen Journalism" to illustrate some of the key features of this form of newswork.
Handout: Resources for Managing Misinformation (2021)Damian Radcliffe
Handout for attendees at the pre-departure orientation for Fulbright scholars and ETAs (2021-22). You can view the presentation at: 10.13140/RG.2.2.21505.17762
This document discusses how law enforcement agencies are increasingly using social media to solve crimes and enhance public safety. It provides examples of cases where social media posts or videos helped identify suspects or provided key evidence. While social media allows greater transparency, some argue it can infringe on privacy and put people at risk for identity theft. Overall, the document suggests that as social media use grows, law enforcement should be able to leverage it as a tool, but also needs to respect privacy and obtain warrants in certain situations.
The Boston Police Department effectively used Twitter and Google Person Finder to disseminate information during the 2013 Boston Marathon bombings when cell service was disrupted. BPD tweeted 148 times over 5 days, growing its Twitter followers from 54,000 to over 330,000. Google Person Finder allowed over 5,400 people to be registered so families could locate loved ones. While some online forums like Reddit dangerously spread misinformation by misidentifying suspects, the BPD and digital tools overall helped provide security and calm the public during the crisis.
The document summarizes the main arguments made by cyber-utopians regarding how the internet would undermine authoritarian governments and spread democracy and dissent. It then outlines three main ways that authoritarian governments have adapted to use the internet to their advantage: (1) spreading propaganda through "spinternet" sites, (2) generating useful information and legitimacy through "authoritarian deliberation" sites that allow some criticism, and (3) closely monitoring the internet to identify dissent early through advanced surveillance technologies. Overall, the document argues that authoritarian governments have been able to use the internet in nuanced ways to maintain and even strengthen their control.
Federal documents detailing the attacks at the U.S. Capitol show a mix of FBI techniques, from license plate readers to facial recognition, that helped identify rioters. Digital rights activists say the invasive technology can infringe on our privacy.
‘Fake News’ on Facebook: A Longitudinal Analysis of Link Sharing between 2016...Axel Bruns
This document summarizes research analyzing the sharing of links to "fake news" domains on Facebook from 2016 to 2021. The researchers collected data on over 40 million Facebook posts linking to over 1,500 questionable news domains. They analyzed the network of pages and groups sharing these links, finding clusters aligned with topics like progressives, conservatives, and conspiracy theories. They also analyzed how posts spread between pages, finding international communities focused on issues like climate change, vaccines, and politics. The research aims to understand the spread of problematic information on Facebook over time and across different communities.
Facebook has a policy prohibiting praise or support of events they deem violate standards, but as internet providers are shielded from liability for user content by Section 230, they have no obligation to censor. However, social media CEOs are censoring accounts that don't conform to their views, like former President Trump for allegedly fomenting the January 6 riot. While people should be responsible for their own actions, social media censoring violates free speech. No one has a monopoly on truth, and social media shouldn't act as arbiters of acceptable views. Congress could repeal Section 230 protections if platforms censor, or CEOs should enable free exchange of all information and viewpoints.
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
Metanomics is a weekly Web-based show on the serious uses of virtual worlds. This transcript is from a past show.
For this and other videos, visit us at http://metanomics.net.
The document discusses the debate around whether pornography is beneficial or detrimental to society. It outlines arguments on both sides of the debate. Proponents argue that pornography can fulfill sexual desires and reduce other criminal behaviors like rape. However, critics argue that pornography can degrade perceptions of women, promote unrealistic expectations, and contribute to relationship problems. The document also notes that the pornography industry is very large and lucrative. Overall, the document explores both the potential positive and negative impacts of pornography on society.
This document discusses the history and legal framework of freedom of speech in the United States. It outlines key Supreme Court cases that have established precedents, including Schenck v. United States which introduced the "clear and present danger" test, and Marsh v. Alabama which established that the First Amendment can apply to private property serving as a public forum. The document then examines questions around whether social media sites can legally censor speech and whether Section 230 or the Constitution need updating to address the role of modern internet platforms.
This document discusses the issue of censorship and provides several examples. It argues that censorship threatens freedom of expression and prevents important ideas from being shared. While censorship has existed throughout history, the Comstock Act of 1873 set the precedent for banning literature deemed sexually inappropriate in the US. The document also discusses several court cases around banning books in schools, including a landmark 1982 Supreme Court case that found students' civil rights were violated by a school board banning books. It notes that while censorship continues to be an issue, groups are working to prevent book banning and the internet has made it harder to censor ideas.
Major social media platforms like Facebook and Twitter have increasingly censored certain types of political speech, threatening democracy and freedom of expression. They determine what information reaches the public and can manipulate people's political views. Recently Twitter banned then-President Trump's account and Apple/Google removed conservative social network Parler from their app stores, showing these companies' growing power to control the flow of information and ideas. If left unchecked, monopolistic tech giants could end up dictating political discourse and limiting individuals' ability to make their own judgments about what to read and believe.
PRISM is a secret NSA program that collects intelligence from major tech companies like Google and Facebook. It allows analysts access to emails, chats, photos, and other data from foreigners using these services. While the NSA claims PRISM only targets non-US persons abroad, it may also incidentally collect some data on Americans due to large amounts of foreign data being routed through US servers. The program is conducted under Section 702 of the FISA Amendments Act but was leaked to the public by Edward Snowden.
Confessions (and Lessons) of a "Recovering" Data Brokermetanautix
The document discusses responsible innovation in big data and privacy. It summarizes that as data and analytics have increased exponentially, so have issues around privacy, surveillance, and the imbalance of power between individuals and large organizations with access to personal data. The author provides examples of how privacy is culturally dependent and discusses challenges around regulating new technologies and balancing individual rights with security and innovation.
Evgeny Morozov presented a document that discusses how the internet and digital technologies are impacting society and politics in different ways around the world. Some key points made include that the internet has been both praised as enabling the spread of freedom and democracy, but also criticized as enabling more control and censorship by authoritarian governments. New digital tools are allowing new forms of both political activism and control over information. The impact of these technologies depends on how they are used and the context of different countries.
1) Social networking sites collect and share large amounts of personal information provided by users, which can be pieced together to determine identities and private details like Social Security numbers.
2) A study found that over 60% of student Facebook profiles disclosed enough personal details that could be used by fraudsters instead of credit reports.
3) Researchers were able to predict the full 9-digit Social Security numbers of 8.5% of Americans born between 1989-2003 just based on publicly available information online.
The document discusses the history and techniques of hacktivism as well as key hacktivist groups and their actions. It also covers the evolution of online political campaigning in the US and the increasing role of the internet in elections. Finally, it defines e-government and outlines the historical development of e-government initiatives in the US.
1) The Broken Windows Theory asserts that addressing minor crimes and disorder prevents more serious crimes. Commissioner William Bratton popularized broken windows policing in New York City in the 1990s, reducing crime.
2) In the 1970s, New Jersey launched a program to improve communities that increased residents' sense of security, though police were skeptical. Broken windows policing aimed to address small issues before they escalated.
3) Zero-tolerance policies, beginning in New York City in 1994, strictly enforced all laws without discretion. While crime dropped, the tactics eroded police-community relations and faced accusations of racial profiling.
This document discusses the history and development of internet pornography from its origins in the early 1990s through bulletin board systems to the present day. It defines pornography and outlines the timeline from the early 1990s when the internet became publicly available to developments like improved streaming media in the 2000s. The document also examines benefits like technological innovations, potential links to reduced crimes, and legal issues around censorship, child pornography, and varying laws globally. In conclusion, it suggests that while internet pornography has downsides, the technologies and economic benefits it has enabled outweigh these issues.
Pivoting off Jay Rosen's definition of citizen journalism, this presentation draws on Steve Outing's "11 Layers of Citizen Journalism" to illustrate some of the key features of this form of newswork.
Handout: Resources for Managing Misinformation (2021)Damian Radcliffe
Handout for attendees at the pre-departure orientation for Fulbright scholars and ETAs (2021-22). You can view the presentation at: 10.13140/RG.2.2.21505.17762
This document discusses how law enforcement agencies are increasingly using social media to solve crimes and enhance public safety. It provides examples of cases where social media posts or videos helped identify suspects or provided key evidence. While social media allows greater transparency, some argue it can infringe on privacy and put people at risk for identity theft. Overall, the document suggests that as social media use grows, law enforcement should be able to leverage it as a tool, but also needs to respect privacy and obtain warrants in certain situations.
The Boston Police Department effectively used Twitter and Google Person Finder to disseminate information during the 2013 Boston Marathon bombings when cell service was disrupted. BPD tweeted 148 times over 5 days, growing its Twitter followers from 54,000 to over 330,000. Google Person Finder allowed over 5,400 people to be registered so families could locate loved ones. While some online forums like Reddit dangerously spread misinformation by misidentifying suspects, the BPD and digital tools overall helped provide security and calm the public during the crisis.
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Nicholas Tancredi
Capstone project for a 12-week online course with the International Association of Crime Analysts. My topic was on how crime and intelligence analysts are using open source intelligence (OSINT) to investigate Internet crime.
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...Nicholas Tancredi
This document discusses how open source intelligence (OSINT) tools and techniques can help law enforcement investigate internet crimes. It provides examples of how social media analysis and dark web investigations have helped identify suspects and combat issues like child pornography. The document also references statistics and studies on topics like drug markets on the dark web and how social media is exploited for criminal activities. It advocates for law enforcement to make use of social media searches and data mining frameworks to facilitate cybercrime investigations and intelligence gathering.
Law enforcement agencies have increasingly used crowdsourcing, particularly through social media, to gather tips from the public in solving crimes. Compared to traditional methods like tip lines, social media allows for a quicker response time and larger scope in obtaining information. While crowdsourcing through social media provides benefits like monitoring suspects' social profiles, it also presents challenges such as the spread of misinformation. Police must be careful to protect wrongly identified individuals from public scrutiny or harassment.
The Broken Windows theory proposes that visible signs of disorder and crime in a neighborhood, such as broken windows left unrepaired, encourage further disorder and more serious crimes. The theory was first introduced in 1982 by George Kelling and James Wilson. While the theory influenced policing strategies focusing on minor crimes and disorder, there is debate around its effectiveness and whether it unfairly targets low-income and minority communities. Both supporters and critics continue to discuss the impacts and implications of the Broken Windows theory.
The document summarizes a research paper that argues pornography has led to a decline in rape in the United States. It notes that rape has declined 85% over the past 25 years as access to pornography has increased. States with the lowest internet access saw increases in rape, while states with the highest access saw declines. The author argues this correlation suggests pornography may satisfy urges that might otherwise lead to rape, though others may propose additional explanations for the relationship between increased porn and lower rape rates. Critics have argued pornography causes violence, but the author claims their conclusions are not supported by evidence.
New digital tools for investigative journalism aajaGannett
This document discusses new digital tools for investigative journalism such as social network analysis, maps, interactive graphics, embedding documents, data visualization, crowdsourcing, and timelines. It provides examples of how newspapers like USA Today, Washington Post, New York Times, Texas Tribune, and others have used these tools in their investigative reporting projects. The tools allow journalists to generate story foundations, simply depict information for readers, see nuances and relationships between data and places, and bring complicated stories to life for audiences.
Chapter 1 Juvenile Justice Myths and RealitiesMyths and RealiMaximaSheffield592
Chapter 1 Juvenile Justice: Myths and RealitiesMyths and Realities
It’s only me.” These were the tragic words spoken by Charles “Andy” Williams as the San Diego Sheriff’s Department SWAT team closed in
on the frail high school sophomore who had just turned 15 years old. Williams had just shot a number of his classmates at Santana High
School, killing two and wounding 13. This was another in a series of school shootings that shocked the nation; however, the young Mr.
Williams did not fit the stereotype of the “superpredator” that has had an undue influence on juvenile justice policy for decades. There have
been other very high-profile cases involving children and teens that have generated a vigorous international debate on needed changes in the
system of justice as applied to young people.
In Birmingham, Alabama, an 8-year-old boy was charged with “viciously” attacking a toddler, Kelci Lewis, and murdering her (Binder, 2015).
The law enforcement officials announced their intent to prosecute the boy as an adult. The accused perpetrator would be among the youngest
criminal court victims in U.S. history. The 8-year-old became angry and violent, and beat the toddler because she would not stop crying. Kelci
suffered severe head trauma and injuries to major internal organs. The victim’s mother, Katerra Lewis, left the two children alone so that she
could attend a local nightclub. There were six other children under the age of 8 also left alone in the house. Within days, the mother was
arrested and charged with manslaughter and released on a $15,000 bond after being in custody for less than 90 minutes. The 8-year-old was
held by the Alabama Department of Human Services pending his adjudication.
A very disturbing video showed a Richland County, South Carolina, deputy sheriff grab a 16-year-old African American teen by her hair,
flipping her out her chair and tossing her across the classroom. The officer wrapped his forearm around her neck and then handcuffed her. It is
alleged that the teen refused to surrender her phone to the deputy. She received multiple injuries from the encounter. The classroom teacher and
a vice principal said that they believed the police response was “appropriate.” The deputy was suspended and subsequently fired after the
Richland County Sheriff reviewed the video. There is a civil suit against the school district and the sheriff’s department for the injuries that
were sustained (Strehike, 2015).
One of the highest profile cases involving juvenile offenders was known as the New York Central Park jogger case (Burns, 2011; Gray, 2013).
In 1989 a young female investment banker was raped, attacked, and left in a coma. The horrendous crime captured worldwide attention.
Initially, 11 young people were arrested and five confessed to the crimes. These five juvenile males, four African American and one Latino,
were convicted for a range of crimes including assault, robbery, rape, and attempted murder. There were two separate jury t ...
This document discusses using activity based intelligence to counter social media sex trafficking in the United States. It begins with an introduction describing the rise of social media use and how traffickers have increasingly used social media to exploit victims. The research question asks if activity based intelligence can be used against social media sex trafficking. The hypothesis is that social media trafficking will grow if left unchecked, but activity based intelligence may provide an effective intelligence collection method to disrupt trafficking online. The document then reviews literature on definitions of trafficking, the internet's role, and how activity based intelligence has been applied to counter threats.
1) Open data and open government initiatives in the 2010s expanded access to data and information from all levels of government and new sources.
2) This led to innovative uses of data by citizens, journalists, and civic hackers to create new tools and insights on issues like public health, transportation, and more.
3) However, challenges remain around data literacy, privacy, and ensuring open data benefits all groups in society not just those who are already empowered. Increased transparency through open data must be accompanied by efforts to bridge digital and data divides.
The document discusses the international efforts to combat online child exploitation through task forces and investigations. It describes the Innocent Images International Task Force formed in 2004 with members from over 20 countries. It also discusses several international investigations that have led to arrests in multiple countries and the rescue of abused children. Finally, it outlines some of the key federal laws and initiatives in the United States to address online child pornography and protect children.
What are the implications of citizens broadcasting the events oflorileemcclatchie
What are the implications of citizens broadcasting the events of a crime as it occurs or of a community tragedy being replayed on millions of phones in the moment? Consider the theories of social control considering one of the most profound modern changes to human society: social media. Then, consider how social media may affect perceptions of crime, both as it occurs and in its aftermath.
In this Discussion, you analyze social control theory in relationship to crime and social media
· Analyze the degree to which social media affects social control in the current event your Instructor has chosen or in the example you contributed.
· Is it practical and/or ethical to attempt to mitigate the effect of social media or media on social control? How could your response change the current event or the example you contributed?
How social media is changing the way people commit crimes and police fight them.
Until the early years of the 21st century, crimes tended to be committed away from the eyes of the majority of society, with traditional media broadcasting information about them often on their own terms.
Ray Surette
writes that the advent of social media in the past decade has led to a new type of ‘performance’ crimes, where people create accounts of their law-breaking through text, images and video, which are then digitally distributed to the public on a large scale. He comments that social media has also opened up new ways of combating crime for the police, who can take advantage of the self-surveillance of those who publicize their crimes on social media.
In 2013, a 16 year old boy in Ottawa, Canada was arrested for making bomb threats to schools across North America. While sadly this type of crime is now not particularly unusual, what is different is the way in which he was caught; his extensive bragging about his anonymous phone calls on Twitter eventually brought the police to his door. Until now, those who commit crimes have preferred to try and hide their actions and identities. However in the 21st century social media world, these surreptitious crimes now compete with
performance crimes like these.
The core elements of contemporary performance crimes are that they are created for
distribution via social media
and involve both willing and unwilling performers. Performance crime can be of two types. The first is a sort of ‘informed consent’ performance where the actors are aware of the production (sometimes recording or filming it themselves) and at least tacitly support its subsequent distribution — in this sense a crime performer is ‘behaving for the camera’ similar to an
actor in a play.
The second involves an uninformed, unwitting performance produced without performer knowledge or acquiescence — here a person is being recorded in a production similar to a
nature documentary.
Social media have caused performances of both types to explode.
These performances are no longer rare events place and time bound to physica ...
The document discusses the challenges of foreign state-sponsored disinformation in the digital age. It provides context on how disinformation spread on social media and Russian propaganda during the Ukraine conflict. The key points made are:
1) Social media has disrupted traditional media and allowed for easy spread of disinformation by states and individuals.
2) Disinformation exploits vulnerabilities in the information ecosystem, including how platforms are designed to optimize viral content, use of bots and fake accounts, and exploitation of human biases.
3) On average, false stories spread much more quickly than the truth on social media, especially for political topics, undermining trust in information. Understanding the interplay between technology, media and human behavior is needed to
The document discusses New York City's use of a mobile text alert system to inform citizens about a bombing suspect, which helped lead to a quick apprehension. While officials felt it was an effective modern tool that engaged the community, some experts raised concerns about privacy, accuracy of information, and overuse reducing effectiveness if not carefully targeted and regulated.
New technologies have advanced policing. The NYPD distributed 41,000 smartphones and tablets to officers to improve response times. Other technologies like body cameras, license plate readers, and ShotSpotter help identify criminals and reduce crime. However, critics argue these technologies infringe on privacy and civil liberties, and cost taxpayers money. Overall, law enforcement technologies aim to make communities safer and help solve crimes.
Alex Jones spread lies that the Sandy Hook school shooting was a hoax and parents were actors, for which he was ordered to pay over $1 billion in damages. However, defamation lawsuits cannot fully repair the harm caused by such lies. The current media environment makes it lucrative to spread outrageous lies. Alex Jones made tens of millions of dollars annually spreading conspiracy theories and supplement sales. Regulations are needed to make spreading harmful lies less profitable and incentivized. Potential approaches include limiting data collection and use to curb engagement-based models, and updated versions of the Fairness Doctrine requiring the spread of corrections.
Page 284 the journal of social media in samit657720
This document summarizes a research study that analyzed social media comments related to a 2015 incident of alleged police brutality against African American teenagers in McKinney, Texas. The study used critical race theory to examine how YouTube, Twitter, and Facebook users interpreted and discussed video evidence of the incident. It found that social media allows for alternative narratives and interpretations of news events, and serves as a platform for marginalized groups to frame issues in a way that challenges mainstream media. The discussion of police brutality on social media is part of the larger #BlackLivesMatter movement that seeks to draw attention to mistreatment of African Americans by law enforcement.
- Whistleblowing has a long history but contexts have changed with the internet now providing a platform to bypass journalists. However, relying too heavily on platforms like WikiLeaks needs reconsideration.
- There are questions around whether whistleblowers now become the story rather than their actual revelations and risks of smear campaigns against them hiding in full view.
- The context of government secrecy, corporate interests, and erosion of privacy online has arguably made disclosure of wrongdoing more important, but has also enabled closing of information flows and top-down control through consolidation of online platforms.
Similar to Boston Marathon Bombing "Crowdsourcing:" How citizens are using the Internet to help solve crimes (19)
Boston Marathon Bombing "Crowdsourcing:" How citizens are using the Internet to help solve crimes
1. Boston Marathon Bombing "Crowdsourcing:" How citizens
are using the Internet to help solve crimes
Different camera angles from the Boston Marathon explosion.
CBS News
(CBS News) -- As law enforcement agencies investigate Monday's bombings at the Boston Marathon
-- and ask the public for photos, videos and information that might help find the perpetrators -- some
corners of the Internet have launched their own "investigations."
CBS News: Crowdsourcing or witch hunt? Reddit and 4chan users attempt to solve Boston bombing
case
For years crime tip lines and even television shows have utilized the help of large groups of people, a
technique known these days as "crowdsourcing," to aid in police investigations. Shortly after the
first episode of "America's Most Wanted" aired in 1988, tips poured in about convicted killer David
James Roberts, an FBI Ten Most Wanted fugitive, leading to his capture after 20 years on the run.
But crowdsourcing in the Internet age has taken the public's involvement in solving crimes to a new
level.
In April of 2012, police in Waynesboro, Va., were investigating a fatal hit-and-run when the
investigation ran out of steam.
"We were at a road block," Capt. Kelly Walker told Crimesider. "There wasn't any way to move
forward until we identified the car."
Looking for help from the public, the department issued a press release with a photograph and
description of a piece of metal left at the scene of the crime. Soon, the popular automotive blog
Jalopnik picked up the story, and commenters were able to identify the evidence as part of an early
2000s Ford F-150 pick-up.
Walker says the site contacted the department and the identification helped lead to suspects who
were later convicted.
"It was really a big help," says Walker. So big, that last December, the department presented the site
with a community service award.
2. Successes like this have led more and more law enforcement agencies to use social media as an
investigation tool.
An annual survey conducted by the International Association of Chiefs of Police found that in 2011,
40 percent of agencies were using social media to solicit tips from the public. Just one year later,
that percentage jumped to 56.8 percent.
"Response is quicker; and the scope is much larger - than the traditional tip line," says Nancy Kolb, a
Senior Program Manager who works with the organization's center for social media. Kolb and the
center work with law enforcement to enhance their capacity to use social media to prevent and solve
crimes.
Kolb says the most common examples of law enforcement reaching out involve posting photos or
videos asking for the public's assistance in identifying a suspect or a witness who may be able to
provide more information.
"It's about reaching the right audience, getting the right people," says social media expert Kenneth
Wisnefski, founder and CEO of the Internet marketing website "WebiMax."
Wisnefski says people appear to respond well to requests for specific information, and the Internet's
ubiquity factors into the public embracing it as a tool for reporting crime.
"Social media is at the forefront of events," Wisnefski says, noting how much information regarding
the recent bombings was picked up and communicated first through sites like Twitter and Facebook.
"We haven't really had opportunity like this before for crowdsourcing on this scale."
Forensic video analyst Grant Fredericks says that when investigators sought information about
rioters in Vancouver in 2011, they received 5,000 hours of video from the public, which helped them
find suspects.
"We're in an electronic age, a surveillance society," says Fredericks, who teaches video analysis at
the University of Indianapolis and the FBI National Academy in Quantico, Va. "Everyone walking
around with a cell phone has an opportunity to collect evidence."
Fredericks says the amount of video evidence available to law enforcement through crowdsourcing
is an incredibly valuable tool, but that investigators often run into trouble because they've "asked
the public to decide what's relevant."
He also warned, "We don't want vigilantes deciding who's guilty or not."
The danger of this point was illustrated this week as users on the social news website Reddit created
forums dedicated to combing through pictures of the crowds near the marathon's finish line and
discussing evidence in search of answers. On the forum thread "findbostonbombers," users
speculate about various theories and "suspects."
"Green Hat Man in center of photo. He's wearing what seems to be a heavily-stuffed backpack.
Anyone spot him in any other photos?" asked one Reddit user.
"That guy is walking away from the location of both bombs, they're down the street behind him,
about 11 mins before the explosions." Another commenter responds. "So that would mean the
backpack he's carrying is highly unlikely to be that in which either of the bombs was secreted."