• ARGUMENT: CONTENT MODERARIONContent Moderation Sacrificed in Left-Right Deals on Tech Reform

    With time running out on the lame-duck Congress, tech reformers are pushing for votes on a package of bills that stalled over the summer. Three bills—the American Innovation and Choice Online Act (AICOA), the Open App Markets Act (OAMA), and the Journalism Competition and Preservation Act (JCPA)—would write special competition rules for large tech companies in ways that could fundamentally change how tech platforms moderate content like hate speech, disinformation, and incitement to violence.

  • PRIVACYSmart AI Tools Could Protect Social Media Users’ Privacy

    Digital assistants could help prevent users from unknowingly revealing their views on social, political and religious issues by fighting AI with AI, researchers say.

  • CHINA WATCHFBI Says It has ‘National Security Concerns’ About TikTok

    By Masood Farivar

    FBI Director Christopher Wray said on Tuesday that the bureau has “national security concerns” about popular short-form video hosting app TikTok. The FBI’s concerns about TikTok include “the possibility that the Chinese government could use it to control data collection on millions of users.”

  • MISINFORMATIONEmpowering Social Media Users to Assess Content Helps Fight Misinformation

    By Adam Zewe

    An experimental platform that puts moderation in the hands of its users shows that people do evaluate posts effectively and share their assessments with others.

  • DISASTERSIn Disasters, People Are Abandoning Official Info for Social Media. How to Know What to Trust

    By Stan Karanasios and Peter Hayes

    In an emergency, where do you turn to find out what’s going on and what you should do to stay safe? The rise of social media has seen community groups, volunteers and non-government organizations nudging out official channels. While these informal sources often provide faster, more local information, they may also be less reliable than government sources.

  • CONSPIRACY THEORIESThe Conspiracy Theorist “Worldview” and the Language of Their Argument

    A study has analyzed the difference between mainstream and conspiracy articles. It found that conspiracies rely on other conspiracies as “evidence,” jumping around different topics, less coherently than mainstream texts, but relying on a web of interconnected ideas to connect the dots.

  • EXTREMISMViolent Extremist Music Prevalent on Spotify, While Platform Largely Declines to Act

    Music has long been an effective way to radicalize extremists, allowing artists to both entertain and indoctrinate vulnerable listeners. Researchers have identified 40 racially or ethnically motivated violent extremist (RMVE) artists with a presence on Spotify, the world’s largest music streaming platform.

  • COMBATTING INFLUENCE CAMPAIGNSFighting Foreign Interference

    By Brendan Nicholson

    Many in Europe did not take the foreign interference threat seriously until Russia launched its war against Ukraine on 24 February, even though European nations were already subjected to a form of hybrid warfare from Russia with cyberattacks on hospitals during the Covid-19 pandemic, attacks on public institutions, attempts to corrupt leaders and financing of political parties. China’s emerging interference campaign emulates Russia’s. Their goal is :to ensure the democracies no longer functioned and gave way to authoritarian regimes,” says a European expert.

  • EXTREMISMMajority of Posts on Extremist Online Forums Made by “Hyper” Poster Cliques

    Most posts in extremist online forums are made by a clique of particularly committed members, a major new study shows. An analysis of the chatrooms have also discovered they have identical participation structures.

  • TRUTH DECAYWhat Fake News About Spiders Can Teach Us About the Global Spread of (Mis)information

    It’s no secret that the internet and social media fuel rampant spread of (mis)information in many areas of life. Now, researchers have explored this phenomenon as it applies to news about spiders. The verdict? Don’t blindly trust anything you read online about these eight-legged arthropods — or anything else for that matter — and always consider the source.

  • TRUTH DECAYTruth Decay in Europe

    What is the empirical evidence for the trends, drivers and consequences of Truth Decay in Europe, and how does that compare with what was found for the United States? To what extent does this evidence apply across Europe as a whole, or are there differences within Europe in the empirical evidence of trends, drivers and consequences of Truth Decay? What are the implications of applying the conceptual framework developed for the United States framework of Truth Decay in Europe? Which areas need to be further investigated in order to tackle Truth Decay in Europe?

  • CYBERSECURITYDid Twitter Ignore Basic Security Measures? A Cybersecurity Expert Explains a Whistleblower’s Claims

    By Richard Forno

    Twitter’s former security chief, Peiter “Mudge” Zatko, filed a whistleblower complaint with the Securities and Exchange Commission in July 2022, accusing the microblogging platform company of serious security failings. Zatko’s most damning accusations center around Twitter’s alleged failure to have a solid cybersecurity plan to protect user data, deploy internal controls to guard against insider threats and ensure the company’s systems were current and properly updated.

  • DISINFORMATIONFighting Against Disinformation with Lessons from Cybersecurity

    By Kylie Foy

    Mary Ellen Zurko pioneered user-centered security in the 1990s. Now she is using those insights to help the nation thwart influence operations.

  • EXTREMISMWhat Happened When Twitter and Other Social Media Platforms Cracked Down on Extremists

    By A. C. Thompson

    In a Q&A with ProPublica reporter A.C. Thompson, former intelligence officer and data scientist Welton Chang explains how conspiracy theorists and violent racists fled to smaller platforms. Once there, their remarks festered and spread.

  • INFORMATION CONFRONTATIONRivalry in the Information Sphere

    How is information confrontation defined in the Russian military-scientific literature and in Russian strategic documents? What are its subtypes, and which Russian organizations contribute to information confrontation efforts? How has information confrontation as an element of Russian military strategy evolved over time, from Imperial Russia to the Putin era? How might the concept and its role in Russian military operations evolve in the future?