Hacker VandaTheGod didn’t realise he was leaving clues scattered across Facebook and Twitter that helped security researchers uncover his true identity.
Note that this is "announced," so we don't know when it's actually going to be implemented.
Facebook today announced new features for Messenger that will alert you when messages appear to come from financial scammers or potential child abusers, displaying warnings in the Messenger app that provide tips and suggest you block the offenders. The feature, which Facebook started rolling out on Android in March and is now bringing to iOS, uses machine learning analysis of communications across Facebook Messenger's billion-plus users to identify shady behaviors. But crucially, Facebook says that the detection will occur only based on metadata -- not analysis of the content of messages -- so that it doesn't undermine the end-to-end encryption that Messenger offers in its Secret Conversations feature. Facebook has said it will eventually roll out that end-to-end encryption to all Messenger chats by default.
That default Messenger encryption will take years to implement.
Facebook hasn't revealed many details about how its machine-learning abuse detection tricks will work. But a Facebook spokesperson tells WIRED the detection mechanisms are based on metadata alone: who is talking to whom, when they send messages, with what frequency, and other attributes of the relevant accounts -- essentially everything other than the content of communications, which Facebook's servers can't access when those messages are encrypted. "We can get pretty good signals that we can develop through machine learning models, which will obviously improve over time," a Facebook spokesperson told WIRED in a phone call. They declined to share more details in part because the company says it doesn't want to inadvertently help bad actors circumvent its safeguards.
The company's blog post offers the example of an adult sending messages or friend requests to a large number of minors as one case where its behavioral detection mechanisms can spot a likely abuser. In other cases, Facebook says, it will weigh a lack of connections between two people's social graphs -- a sign that they don't know each other -- or consider previous instances where users reported or blocked a someone as a clue that they're up to something shady.
One screenshot from Facebook, for instance, shows an alert that asks if a message recipient knows a potential scammer. If they say no, the alert suggests blocking the sender, and offers tips about never sending money to a stranger. In another example, the app detects that someone is using a name and profile photo to impersonate the recipient's friend. An alert then shows the impersonator's and real friend's profiles side-by-side, suggesting that the user block the fraudster.
Details from Facebook
Google has announced that advertisers on its platforms will have to verify their identities and their businesses. They will have 30 days to comply.
On its face, this seems like common sense and a good idea. The Internet has been rife with fraudulent Covid-19 schemes targeting stimulus checks, selling snake oil cures and price gouging on hard to acquire products. The reality is less clearcut.
Where’s The Data?
The first issue here is Google’s track record when it comes to data mining and privacy. The company is the most successful, and also one of the most appetitive compilers of personal information in digital media.
While it’s fairly common knowledge that Google’s Chrome browser is no stranger to controversy when it comes to tracking users and collecting data, there is more worrisome activity that gets far less attention. The company aggregates data from its phones, tablets, home media devices, personal assistants, website searches, analytics platform, and even offline credit card transactions. To say that it already has access to data about businesses and individuals would be an understatement and only serves to underscore what’s wrong with this latest initiative.
There has been plenty of opportunity for Google put its vast stores of data to use in the identification of bad actors on its platforms with a greater level of sophistication than anything that could be gleaned from digital copies of personal and employee identification numbers or business incorporation documents. They already have everything they need to determine if someone is from the U.S. or Uzbekistan.
Occam’s Razor points to two explanations. First, Google is doing what it does best: collecting more information. Two, Google is doing what it does best: using information to solve an information problem. Either way, it’s not a very memorable solution.
Ignoring the Realities of Business Identity Theft
it seems naive to take the position that the submission of digital copies of documents can provide a reliable way to establish the identity of a particular business. In an era where Social Security numbers and tax IDs can be bought by the millions on the dark web and computers are capable of rendering real-time deepfakes on video conference calls, faking a document or credentials is child’s play for any scammer worth his or her Bitcoin.
For starters, this easily flouted protocol engenders a false sense of security for internet users who assume Google’s verification process works. If this sounds cynical, remember that Facebook tried something like this following the widespread manipulation of its platform during the 2016 election. It failed.
This practice also puts a target on businesses. At a minimum, it will require the widespread transmission of digital copies of potentially sensitive business documents, which opens the door to scammers trying to intercept that data. Business identity theft is a very real threat, and access to a business’s credentials can leave it vulnerable to data breaches, fraud, cyberattacks, and worse. At a maximum, it could actually boost the market for illicit or compromised information on businesses as a means of supplying fake credentials to Google.
We’ve seen time and again that scammers are creative and extremely persistent when it comes to gaining access to sensitive data, and we can only assume any ill-considered move to protect data will be viewed as a growth opportunity for cybercriminals.
The term “security theater” gained popularity after the implementation of TSA security measures in the wake of the 9/11 attacks, and it seems applicable here.
Google’s new policies seem like marketing more than security. While it’s likely to make customers and businesses that use its online advertising platform feel more safer, it could easily have the opposite effect.
A company with Google’s reach, resources, and oftentimes incredibly granular data isn’t likely to be made any more secure by collecting and gathering digital documents from its clients. It might, however, be putting businesses at greater risk of fraud and data compromise.
In this season of social distancing, teens need their friends more than ever. Daily digital connection — through texting, video chat, social networks, and gaming — is critical to keeping friend groups strong. But could increased time online these days lead to an increase in cyberbullying?
While there isn’t data to answer that question definitively, it wouldn’t be surprising for parents to notice some signs of conflict surface as the months continue to creep by. And, with re-open dates for schools in limbo, it’s more important than ever to keep the family safety conversation humming.
For clarity: Allowing more screen time doesn’t mean more cyberbullying or conflict is certain to occur. However, experience has taught us that more screen time does increase the potential for digital conflict.
Social and Emotional Fallout
This unprecedented health event hasn’t been easy on anyone, but kids especially are likely to be holding onto some big emotions about it. A recent Common Sense Media study confirms that social media has been key to helping kids get through this crisis, but one in four kids surveyed feels “more lonely than usual.”
The school year with its milestones — proms, graduations, dates, parties — ended abruptly. It’s logical to assume these losses have sparked feelings of sadness, anger, frustration, and anxiety. And because online is where most kids connect with peers, these emotions can easily play out there in the form of aggressive behavior, conflict, or persistent drama.
So how do you know if your child is being cyberbullied or dealing with conflict online? It isn’t always easy simply because so many kids won’t admit to being bullied. Often they believe telling an adult will make the harassment worse. They may feel ashamed or embarrassed about a regretful situation or the fact that they’re being targeted in the first place. For that reason, one of the best ways to help your child is to be aware of the time they spend online, the people they connect with, and how those digital circles impact their wellbeing.
What to Look For
The many forms of cyberbullying continue to evolve alongside the digital culture. Here are just a few ways kids bully one another.
- Saying hurtful or intimidating things to someone on social media, a text, or email.
- Making negative comments about a person’s sexuality, race, religion, handicaps, or physical features.
- Camouflaging hurtful or threatening comments with words like “jk” (just joking).
- Asking online friends to vote for or against another person, with Instagram polls or captions such as “Is this person hot or not?” or “Would you go out with this person?”
- Posting or sharing with others the private photos, memes, emails, texts, or secrets without the permission of another person.
- Intentionally posting unflattering or embarrassing photos of another person.
- Spreading rumors or false information about another person online.
- Making any threat to another person no matter how harmless you think it may be.
Signs of Cyberbullying
If your child is getting bullied online, there are some potential signs.
- Anxious or upset after reading a text, frequently gets sick or nauseous, declines invitations from friends, or bows out of fun family outings.
- Trouble sleeping or being withdrawn or moody.
- Being protective of his or her phone, deleting or deactivating social networks
- Sudden loss of a steady friend group or sudden complaining about once-loved friends.
- Loss of interest in favorite sports or hobbies or a decline in grades.
- References to suicide, loneliness, and hopelessness (when severe bullying is taking place).
Know Where They Go
Another way to understand your child’s emotional connection to his or her digital communities is to learn about their favorite platforms and monitor them. Pay specific attention to the tone of his or her social threads. And, if you see concerning comments or posts, ask your child how you can help. If your child is using risky apps such as WhatsApp or Kik, that allows people to use the app anonymously, discuss your concerns with your child. Some social networks are more conducive to cyberbullying than others.
Monitor Gaming Communities
Gaming time can skyrocket during the summer, and when games get competitive, cyberbullying can happen. Spend time with your child while he or she is gaming. Listen to the tone of the conversations and be aware of your child’s demeanor. For your child’s physical and emotional health, make every effort to set gaming limits as summer approaches.
Parenting Moves to Avoid
Bullying experts will tell you that what you don’t do if your child is getting bullied is often as important as what you do. Here’s some insight:
1) Never advise a child to ignore the bullying. 2) Never blame a child for being bullied even if he or she did something to aggravate the bullying. No one deserves to be bullied. 3) As angry as you feel that someone is bullying your child, do not encourage your child to fight back physically. 4) Don’t overreact; escalate accordingly. If you can identify the bully, consider talking with the child’s parents. 5) Don’t lead the charge. Give your child veto power over your involvement. If they say they don’t want you to get involved (unless you suspect physical danger or suicide), respect that. 6) If the bullying continues to escalate, report it, seek help from school counselors or the police if necessary. 7) Even if you are fearful, don’t take your child’s digital devices away. He or she didn’t do anything wrong.
A number of organizations are leading the charge against cyberbullying and have fantastic resources for families. Here are just a few: Cyberbullying Research Center, StopBullying.gov, StompOutBullying.org, KindCampaign.com, ItGetsBetter.org, National Bullying Prevention Center. If you’d like your organization added to this list, please leave a comment.
We hope you and your family are staying healthy these days and finding some time to talk about online safety. If you need a refresher, read Part I and Part II of our Online Safety Basics series. And, if you’re looking for a fun school lesson for the day, you can always quiz your kids on any of McAfee’s Family Safety content!
The post Is Your Child Being Cyberbullied? What Parents Need to Know appeared first on McAfee Blogs.
Every day we discover (or stumble over) new ways of coping and connecting during this unique chapter in family life. Still, as every age group under your roof finds their favorite virtual play date and hangout apps, parents may need to add a few safety rails to make sure the fun stays fun.
IRL community resurfaces
While this health crisis is devastating in so many ways, it’s also put a spotlight on the many heartwarming ways to connect in real life (IRL). We’re placing teddy bears in our windows for solidarity, creating scavenger hunts for neighborhood kids, serenading shut-ins, publically supporting first responders, celebrating birthdays and graduations with drive-by parades, and so, so much more.
The ongoing infusion of true, human connection has softened the uncertainty. Still, kids of every age need to maintain an emotional connection with peers. Here are a few things to think about as kids of every age connect with friends online.
Pre-K and Elementary Virtual Play Dates
Since health experts have put restrictions on familiar fun for little ones such as playgrounds, sports leagues, sleepovers, playdates, and even visits with grandparents, parents are relaxing screen time rules and looking for ways to have virtual playdates. Free video tools such as FaceTime and Zoom are proving lifesavers for group art, play, and learning, as are safe websites for young ones and phone apps. (If you run out things to do, here’s a great list of fun to tap and great learning sites for every age group).
Keep Them Safe
- Share online experiences with young children at all times. Sit with them to teach, monitor, and explain the context of new digital environments. Also, keep computers and phones in a common area.
- Try to keep screen time brief. Even young kids can become too screen-reliant.
- Maximize privacy settings on all devices and turn on and safe mode or search on websites and apps.
- Introduce concepts such as cyberbullying and strangers in age-appropriate language.
- Start family security efforts early. Consider the benefits of filtering software, safe browsing, and encrypting your family’s digital activity with a Virtual Private Network (VPN).
Middle and High Schooler Virtual Hang Outs
While screen time has spiked, digital connection while homebound is also essential for tweens and teens for both learning and peer relationships. Kids finding their new virtual hangouts on social networks, group chats, and video games. They are also playing virtual board games using sites such as Pogo, Let’s Play Uno, and Zoom. Netflix Party has become a fun way to watch Netflix with groups of friends.
Keep Them Safe
- At this age many kids (own or will soon own) a smartphone. With increased time online, you may want to review the basics, such as privacy and location settings. This includes gaming devices.
- With increased internet use and most schools closed for the year, using parental control software and gaming security software can help parents reduce online risks for children of all ages.
- Be aware of and talk about trending, risky digital behaviors, and challenges that can surface on apps such as TikTok, and WhatsApp.
- Review and approve games and apps before they are downloaded and consider monitoring your children’s devices as well as social profiles and posts.
- This age group is quick to jump on public wifi, which puts your family’s data at risk. Exploring using a family VPN is critical for this age group.
- Discuss the danger of connecting with strangers online. Also, discuss the risks of oversharing personal information and photos, even in seemingly private chats and texts. Don’t let boredom lead to bad choices.
- Discuss cyberbullying and how to block and report accounts that express hateful, racist, or threatening behavior.
- Coach your kids on using strong passwords and how to verify legitimate websites and identity online scams.
There’s nothing normal for families about this time, but there is something special. Grab it. Keep talking and laughing, especially on the hard days. Have a daily “heart check-in” with your teen if he or she seems to be isolating. Give one another space for topsy turvy moods. And, don’t forget parents, before this is all over, be sure to nail that TikTok dance with your kids and share it with the world!
The post Keeping Virtual Play Dates, Hang Outs, and Video Chats Safe for Everyone appeared first on McAfee Blogs.
Do you find yourself working from home these days? Kids off school too? Then your daily life is set to change super-fast. Yes, there is so much to organise to implement this essential ‘social distancing’ strategy. But in the flurry to get everyone set up, it’s essential that we don’t cut corners, make rash decisions so we can ensure both our headspace and online safety aren’t at risk.
The New Era of Social-Distancing
Many workplaces have already instructed their staff to ‘social distance’ and work from home so we can ‘flatten the curve’ while others are probably not far away from making this decision. Many Australian states have given parents the option to keep their children at home. So, even if you (and the kids) are not yet home, it’s wise to start thinking about how our work (and learn) from home lives might look while we are ‘social-distancing’ and, how can keep our households safe when online. Here’s a few things to consider:
Breath. These are Uncertain Times
It’s completely normal to feel anxious and stressed in this time of great uncertainty. While we are hopeful that ‘social distancing’ measures will help minimise the impact of the virus, the truth is – we just don’t really know what the upcoming months will look like. Acknowledging that you (and all your family members) will be feeling anxious and ‘out of sorts’ at the moment is essential. Cutting family members some slack, particularly if you are all ‘cooped up’ together will definitely make for a smoother self-isolation experience!
Always Think Critically & Don’t Overload on News
When we are feeling panicked and stressed, it’s easy for our rational brains to stop functioning. Social media feeds have been full of ‘miracle cures’ for COVID-19 which have been of great interest to many stressed out peeps. PLEASE avoid clicking links and ‘buying into’ this. Not only could these be links to malicious websites designed to extract your private information, but these themes just feed our anxiety. Instead, seek out advice from reputable medical institutions and authorities. Being a critical thinker online is more important now more than ever.
And if the constant barrage of news about the pandemic is affecting your (and your family’s) mood and outlook then take a break from it. Maybe limit yourself to checking for updates once per day as opposed to having constant updates come through on your phone. It’s super easy to disable news notifications, if you are Apple user, here’s what you need to do and, if you are an Android user, these tips may help.
Ensure You Are Using the Correct Platforms & Software
Before you start downloading programs you think are helpful, check with your workplace or employer about their preferred platforms. It’s highly likely you will have most of the programs they require whether it’s Facetime, Slack, Zoom or Trello. But if you don’t, please ensure you download apps from a reputable source such as the AppStore or Google Play or a site that has been approved by your employer. Third party app sites are to be avoided at all costs because the chances are, you’ll score yourself some malicious software!
Protect Yourself & Your Data
Please check whether you employer has security software and a Virtual Private Network (VPN) installed on your devices. If not, or you are using your ‘home’ devices to undertake company work, then ensuring that both your stored data and the data you share over the internet is protected is essential.
Using a device without security software is a little like leaving your front door open – you are essentially inviting anyone to enter. So, investing in a comprehensive security software solution that protects you from dodgy downloads, visiting fake websites, malicious software and viruses is a no brainer! A VPN will also protect the data that you share from your devices by effectively creating an encrypted tunnel between your device and the router – the ultimate way of keeping the cybercrimals out!
Back-Up Your Data
Check with your employer to ensure that all your data will be backed up, even when working from home. If they can’t guarantee your work will be backed up then you need to find yourself a reliable, safe option. I am a Dropbox fan but Google Drive is also a great tool. But if you need something a little more robust then check out IDrive or IBackUp.
And don’t forget about the kids! If your offspring are remote schooling, ensure all their hard work is backed up too. Google Drive or Dropbox is a great solution for students.
Manage Your Internet Usage at Home
If your household has two adults working from home plus a tribe of kids remote schooling, then chances are your internet may slow. With more than 90% of Aussies now accessing the internet through the NBN, many are worried that the spike in demand may create havoc. While the folks from NBN keep assuring us that it’s all going to be fine, we may need to find ourselves staggering our internet use. Why not encourage your kids to do offline activities such as reading or craft while you have some designated time for emails or an online meeting? And don’t forget, you can always create a hotspot from your mobile for another internet source.
Invest in Your Back & Neck – Splash Out on Some Gadgets
Setting up a designated workspace at home is critical to providing some structure in this new phase of your work life. Why not use this as an excuse to get properly setup?
I’ve worked from home for many years but could not have done so without my large monitor and my stand-up desk. Like many peeps, I have a dodgy neck so my stand-up desk and large monitor have meant that I can continue to work with no pain! I simply plug my laptop into my monitor and happy days – everything in enlarged and at eye height! On the days that I decide to work from my kitchen benchtop, my neck always starts to throb – you’d think I’d learn!
And don’t think you need to spend a fortune. A large monitor can cost as little as $200 and a stand-up desk not much more. If you are using these items for work, the chances are you’ll be able to claim these purchases as a tax deduction – why not talk to your accountant?
There is no doubt that 2020 will be ‘the year we will remember for the rest of our lives’. And while the bulk of us aren’t in the high-risk category, it is essential that we all do our bit so that we can protect our most vulnerable. So, please take the time to ensure you are cybersafe while setting up your new work (and school) from home life and even more importantly, keep washing your hands!!
Till Next Time
In May 2019, FireEye Threat Intelligence published a blog post exposing a network of English-language social media accounts that engaged in inauthentic behavior and misrepresentation that we assessed with low confidence was organized in support of Iranian political interests. Personas in that network impersonated candidates for U.S. House of Representatives seats in 2018 and leveraged fabricated journalist personas to solicit various individuals, including real journalists and politicians, for interviews intended to bolster desired political narratives. Since the release of that blog post, we have continued to track activity that we believe to be part of that broader operation, reporting our findings to our intelligence customers using the moniker “Distinguished Impersonator.”
Today, Facebook took action against a set of eleven accounts on the Facebook and Instagram platforms that they shared with us and, upon our independent review, we assessed were related to the broader Distinguished Impersonator activity set we’ve been tracking. We separately identified a larger set of just under 40 related accounts active on Twitter against which Twitter has also taken recent enforcement action. In this blog post, we provide insights into the recent activity and behavior of some of the personas in the Distinguished Impersonator network, in order to exemplify the tactics information operations actors are employing in their attempts to surreptitiously amplify narratives and shape political attitudes.
Personas in the Distinguished Impersonator network have continued to engage in activity similar to that we previously reported on publicly in May 2019, including social media messaging directed at politicians and media outlets; soliciting prominent individuals including academics, journalists, and activists for “media” interviews; and posting what appear to be videoclips of interviews of unknown provenance conducted with such individuals to social media. The network has also leveraged authentic media content to promote desired political narratives, including the dissemination of news articles and videoclips from Western mainstream media outlets that happen to align with Iranian interests, and has amplified the commentary of real individuals on social media.
Outside of impersonating prominent individuals such as journalists, other personas in the network have primarily posed as U.S. liberals, amplifying authentic content from other social media users broadly in line with that proclaimed political leaning, as well as material more directly in line with Iranian political interests, such as videoclips of a friendly meeting between U.S. President Trump and Crown Prince of Saudi Arabia Mohammad Bin Salman accompanied by pro-U.S. Democrat commentary, videoclips of U.S. Democratic presidential candidates discussing Saudi Arabia's role in the conflict in Yemen, and other anti-Saudi, anti-Israeli, and anti-Trump messaging. Some of this messaging has been directed at the social media accounts of U.S. politicians and media outlets (Figure 1).
Figure 1: Twitter accounts in the Distinguished Impersonator network posting anti-Israeli, anti-Saudi, and anti-Trump content
We observed direct overlap between six of the personas operating on Facebook platforms and those operating on Twitter. In one example of such overlap, the “Ryan Jensen” persona posted to both Twitter and Instagram a videoclip showing antiwar protests in the U.S. following the killing of Qasem Soleimani, commander of the Islamic Revolutionary Guards Corps’ Quds Force (IRGC-QF) by a U.S. airstrike in Baghdad in January 2020 (Figure 2). Notably, though the strike motivated some limited activity by personas in the network, the Distinguished Impersonator operation has been active since long before that incident.
Figure 2: Posts by the “Ryan Jensen” persona on Twitter and Instagram disseminating a videoclip of antiwar protests in the U.S. following the killing of Qasem Soleimani
Accounts Engaged in Concerted Replies to Influential Individuals on Twitter, Posed as Journalists and Solicited Prominent Individuals for “Media” Interviews
Personas on Twitter that we assess to be a part of the Distinguished Impersonator operation engaged in concerted replies to tweets by influential individuals and organizations, including members of the U.S. Congress and other prominent political figures, journalists, and media outlets. The personas responded to tweets with specific narratives aligned with Iranian interests, often using identical hashtags. The personas sometimes also responded with content unrelated to the tweet they were replying to, again with messaging aligned with Iranian interests. For example, a tweet regarding a NASA mission received replies from personas in the network pertaining to Iran’s seizure of a British oil tanker in July 2019. Other topics the personas addressed included U.S.-imposed sanctions on Iran and U.S. President Trump’s impeachment (Figure 3). While it is possible that the personas may have conducted such activity in the hope of eliciting responses from the specific individuals and organizations they were replying to, the multiple instances of personas responding to seemingly random tweets with unrelated political content could also indicate an intent to reach the broader Twitter audiences following those prominent accounts.
Figure 3: Twitter accounts addressing U.S.-imposed sanctions on Iran (left) and the Trump impeachment (right)
Instagram accounts that we assess to be part of the Distinguished Impersonator operation subsequently highlighted this Twitter activity by posting screen recordings of an unknown individual(s) scrolling through the responses by the personas and authentic Twitter users to prominent figures’ tweets. The Instagram account @ryanjensen7722, for example, posted a video scrolling through replies to a tweet by U.S. Senator Cory Gardner commenting on “censorship and oppression.” The video included a reply posted by @EmilyAn1996, a Twitter account we have assessed to be part of the operation, discussing potential evidence surrounding President Trump’s impeachment trial.
Figure 4: Screenshot of video posted by @ryanjensen7722 on Instagram scrolling through Twitter replies to a tweet by U.S. Senator Cory Gardner
We also observed at least two personas posing as journalists working at legitimate U.S. media outlets openly solicit prominent individuals via Twitter, including Western academics, activists, journalists, and political advisors, for interviews (Figure 5). These individuals included academic figures from organizations such as the Washington Institute for Near East Policy and the Foreign Policy Research Institute, as well as well-known U.S. conservatives opposed to U.S. President Trump and a British MP. The personas solicited the individuals’ opinions regarding topics relevant to Iran’s political interests, such as Trump’s 2020 presidential campaign, the Trump administration’s relationship with Saudi Arabia, Trump’s “deal of the century,” referring to a peace proposal regarding the Israeli-Palestinian conflict authored by the Trump administration, and a tweet by President Trump regarding former UK Prime Minister Theresa May.
Figure 5: The “James Walker” persona openly soliciting interviews from academics and journalists on Twitter
Twitter Personas Posted Opinion Polls To Solicit Views on Topics Relevant to Iranian Political Interests
Some of the personas on Twitter also posted opinion polls to solicit other users’ views on political topics, possibly for the purpose of helping to build a larger follower base through engagement. One account, @CavenessJim, posed the question: “Do you believe in Trump’s foreign policies especially what he wants to do for Israel which is called ‘the deal of the century’?” (The poll provided two options: “Yes, I do.” and “No, he cares about himself.” Of the 2,241 votes received, 99% of participants voted for the latter option, though we note that we have no visibility into the authenticity of those “voters”.) Another account, @AshleyJones524, responded to a tweet by U.S. Senator Lindsey Graham by posting a poll asking if the senator was “Trump’s lapdog,” tagging seven prominent U.S. politicians and one comedian in the post; all 24 respondents to the poll voted in the affirmative. As with the Instagram accounts’ showcasing of replies to the tweets of prominent individuals, Instagram accounts in the network also highlighted polls posted by the personas on Twitter (Figure 6).
Figure 6: Twitter account @CavenessJim posts Twitter poll (left); Instagram account @ryanjensen7722 posts video highlighting @CavenessJim's Twitter poll (right)
Videoclips of Interviews with U.S., U.K., and Israeli Individuals Posted on Iran-Based Media Outlet Tehran Times
Similar to the personas we reported on in May 2019, some of the more recently active personas posted videoclips on Facebook, Instagram, and Twitter of interviews with U.S., UK, and Israeli individuals including professors, politicians, and activists expressing views on topics aligned with Iranian political interests (Figure 7). We have thus far been unable to determine the provenance of these interviews, and note that, unlike some of the previous cases we reported on in 2019, the personas in this more recent iteration of activity did not themselves proclaim to have conducted the interviews they promoted on social media. The videoclips highlighted the interviewees’ views on issues such as U.S. foreign policy in the Middle East and U.S. relations with its political allies. Notably, we observed that at least some of the videoclips that were posted by the personas to social media have also appeared on the website of the Iranian English-language media outlet Tehran Times, both prior to and following the personas' social media posts. In other instances, Tehran Times published videoclips that appeared to be different segments of the same interviews that were posted by Distinguished Impersonator personas. Tehran Times is owned by the Islamic Propagation Organization, an entity that falls under the supervision of the Iranian Supreme Leader Ali Khamenei.
Figure 7: Facebook and Instagram accounts in the network posting videoclips of interviews with an activist and a professor
The activity we’ve detailed here does not, in our assessment, constitute a new activity set, but rather a continuation of an ongoing operation we believe is being conducted in support of Iranian political interests that we’ve been tracking since last year. It illustrates that the actors behind this operation continue to explore elaborate methods for leveraging the authentic political commentary of real individuals to furtively promote Iranian political interests online. The continued impersonation of journalists and the amplification of politically-themed interviews of prominent individuals also provide additional examples of what we have long referred to internally as the “media-IO nexus”, whereby actors engaging in online information operations actively leverage the credibility of the legitimate media environment to mask their activities, whether that be through the use of inauthentic news sites masquerading as legitimate media entities, deceiving legitimate media entities in order to promote desired political narratives, defacing media outlets’ websites to disseminate disinformation, spoofing legitimate media websites, or, as in this case, attempting to solicit commentary likely perceived as expedient to the actors’ political goals by adopting fake media personas.
What Can You Do To Make The Internet a Better Place
In 2020, you’d be hard-pressed to find an Aussie teen who doesn’t spend a fair whack of their time online. And while many of us parents don’t always love the time our offspring spend glued to screens, most of us have come to accept that the online world is a big part of our kids’ lives.
So, let’s accept that the internet is going to be a feature of our kids’ lives and work out how best we can keep them safe.
Together For A Better Internet
Today is Safer Internet Day – an international annual event that encourages us all to work together for a better internet. The perfect opportunity to find out what we can do as parents to ensure our kids are as safe as possible online.
Organised by the joint Insafe/INHOPE network, with the support of the European Commission, Safer Internet Day is held each February to promote the safe and positive use of digital technology, especially among children and young people. Safer Internet Day is all about inspiring users to make positive changes online, to raise awareness of online safety issues, and participate in events and activities right across the globe.
What Can We Do As Parents?
As role models and life-educators, parents play an enormous role in shaping our kids’ behaviours and opinions – particularly before they get to the teenage years!! So, why not use Safer Internet Day as a prompt to freshen up your cybersafety chats with your brood.
Not sure where to start? Here are my top messages to weave into your chats with your kids
Be Kind Online
Spread love not hate online. A better internet includes building an online culture where people share positive and encouraging posts and comments. It may be as simple as posting a positive message, liking a post that is encouraging or sharing an inspiring article. Image
It may sound obvious but before you post a comment or a tweet, ask yourself whether the message could offend someone or impact them negatively. And remember to NEVER like, favourite, retweet, post or comment negatively online.
Learn How To Disagree Respectfully Online
No matter how much we try, there will always be some people online who get a kick out of being unkind. If you come across this behaviour, I encourage you to call it out and report it but ALWAYS do so in a respectful fashion. Reciprocating with harsh words or name-calling will only further inflame a toxic situation. A logical, factual response that is respectful will always triumph!
Protecting Your Online Reputation (& Others Too)
If you’re planning on hiring someone or even going on a date with someone, the chances are you’re going to ‘Google’ them first. And what you find online and the opinion you form decides whether the person’s digital reputation is acceptable or not.
So, it’s essential to remember that everything you post online is permanent and public; not to post inappropriate comments or pics of yourself or others; ensure all your online profiles are set to private to avoid strangers ‘screen-grabbing’ your private info and photos; don’t respond to inappropriate requests and most importantly, take a breather when things are getting heated online and you may regret your comments and actions.
Managing passwords is one of the best ways of taking control of your online life and creating a better internet. Ensuring you have a separate password for every online account means that if you are affected by a data breach, your other online accounts are not at risk. Always choose passwords that have letters, numbers and symbols and ensure they are complex and not obvious. I love using a nonsensical sentence! And if all that’s too hard, why not consider a password manager that not only creates complex passwords for each of your online accounts but remembers them too. All you need to do is remember the master password! Awesome!!
So, why not pledge to change up your cybersafety chats with your kids this Safer Internet Day? And remember – they are watching you too! So, ensure you always model online respect, take your online responsibilities seriously and, also manage your passwords carefully. Because every little step is a step towards a positive change.
Editor’s note: This is part II in a series on Fake News. Read part I, here.
Kids today are not equipped to deal with the barrage of digital information coming at them every day. Add to that, the bulk of information that may be fake, misleading, or even malicious. So how do we help kids become more responsible for the content they share online?
We do it one conversation at a time.
When it comes to the mounting influence of fake news, it’s easy to point the finger at the media, special interest groups, politicians, and anyone else with an agenda and internet access. While many of these groups may add to the problem, each one of us plays a role in stopping it.
What’s our role?
We, the connected consumer, now play such a significant role in how content is created and disseminated, that a large part of the solution comes down to individual responsibility — yours and mine.
The shift begins with holding ourselves accountable for every piece of content we read, create, or share online. That shift gains momentum when we equip our kids to do the same.
Teach personal responsibility. Start the conversation around personal responsibility early with your kids and keep it going. Explain that every time we share fake news, a rumor, or poorly sourced material, we become one cog in the wheel of spreading untruths and even malicious fabrications. We become part of the problem. Challenge your child to become a trustworthy, discerning source of information as opposed to being viewed by others as an impulsive, unreliable source.
Discuss the big picture. Fake news or misleading content isn’t just annoying; it’s harmful in a lot of other ways. Misinformation undermines trust, causes division, can spark social unrest, and harm unity. More than that, fake news edges out helpful, factual, content designed to educate and inform.
Be aware of confirmation bias. Confirmation bias is gravitating toward ideas, people, and content that echoes our spiritual, social, political, or moral points of view. Confirmation bias tempts us to disregard information that opposes our ideology. While confirmation bias is part of our human nature, left unchecked, it can be an obstacle to learning factual information.
Chill, don’t spill. Fake news is designed to advance a personal agenda. This is especially true during times of social tension when tempers are running high. Don’t take the emotional bait. Exercise discernment. Before sharing, read legitimate news sources that offer balanced coverage, so the story you share or opinion you express is based on accurate information.
Be a free thinker. Our kids have grown up in a world where ‘like’ and ‘share’ counts somehow equate to credibility. Encourage kids to break away from the crowd and have the courage to be free, independent thinkers.
Challenge content by asking:
- Do I understand all the points of view of this story?
- What do I really think about this topic or idea?
- Am I overly emotional and eager to share this?
- Am I being manipulated by this content?
- What if I’m wrong?
Question every source. Studies show that people assume that the higher something ranks in search results, the more factual or trustworthy the information is. Wrong. Algorithms retrieve top content based on keywords, not accuracy. So, dig deeper and verify sources.
5 ways to spot fake news
1. Look closely at the source. Fake news creators are good at what they do. While some content has detectable errors, others are sophisticated and strangely persuasive. So, take a closer look. Test credibility by asking:
- Where is the information coming from?
- Is this piece satire?
- Is the author of the article, bio, and website legitimate?
- Are studies, infographics, and quotes appropriately attributed?
- Is the URL legitimate (cnn.comvs. cnn.com.co)?
- Are there red flags such as unknown author, all capital letters, misspellings, or grammar errors?
2. Be discerning with viral content. Often a story will go viral because it’s so unbelievable. So pause before you share. Google the story’s headline to see if the story appears in other reliable publications.
3. Pay attention to publish dates, context. Some viral news items may not be entirely false, just intentionally shared out of context. Fake news creators often pull headlines or stories from the past and present them as current news to fit the desired narrative.
4. Beware of click-bait headlines. A lot of fake news is carefully designed with user behavior in mind. A juicy headline leads to a false news story packed with even more fake links that take you to a product page or, worse, download malware onto your computer, putting your data and privacy at risk. These kinds of fake news scams capitalize on emotional stories such as the recent tragic death of basketball great Kobe Bryant.
5. Verify information. It takes extra effort, but plenty of sites exist that can help you verify a piece of information. Before sharing that a piece of content, check it out on sites like:
While fake news isn’t a new phenomenon, thanks to technology’s amplification power, it’s reached new levels of influence and deception. This social shift makes it imperative to get in front of this family conversation as soon as possible especially since we’re headed into an election year.
The post Spotting Fake News: Teaching Kids to be Responsible Online Publishers appeared first on McAfee Blogs.
Give yourself a high-five, parents. Pour yourself a cup of coffee or your favorite celebratory drink and sip it slow — real slow. Savor the wins. Let go of the misses. Appreciate the lessons learned. You’ve come a long way in the last decade of raising digital kids, and not all of it has been easy.
As we head into 2020, we’re tossing parenting resolutions (hey, it’s a victory to make it through a week let alone a year!). Instead, we’re looking back over the digital terrain we’ve traveled together and lessons learned. Need a refresher? Here’s a glimpse of how technology has impacted the family over the past decade.
In the last decade
• Smartphone, social, gaming growth. Social media and gaming platforms have exploded to usage and influence levels no one could have imagined. Smartphone ownership has increased and as of 2019: 81% of adults own a smartphone and 72% use social media, 53% of kids own a smartphone by the age of 11, and 84 % of teenagers have phones.
• Video platform growth. Video platforms like YouTube have become the go-to for teens and tweens who spend nearly three hours a day watching videos online.
• Streaming news. Smartphones have made it possible for all of us to carry (and stream) the world in our pockets. In 2018, for the first time, social media sites surpassed print newspapers as a news source for Americans.
• Dating apps dominate. We’re hooking up, dating, and marrying using apps. A Stanford study found that “heterosexual couples are more likely to meet a romantic partner online than through personal contacts and connections.”
• The rise of the Influencer. Internet influencers and celebrities have reached epic levels of fame, wealth, and reach, creating an entire industry of vloggers, gamers, micro and niche-influencers, and others who have become “instafamous.”
• Lexicon changes. Every day, technology is adding terms to our lexicon that didn’t exist a decade ago such as selfie, OMG, streaming, bae, fake news, the cloud, wearables, finsta, influencers, emojis, tracking apps, catfish, digital shaming, screen time, cryptojacking, FOMO, and hashtag, along with hundreds of others.
What we’ve learned (often the hard way)
Most people, if polled, would say technology has improved daily life in incalculable ways. But ask a parent of a child between five and 18 the same question, and the response may not be as enthusiastic. Here are some lessons we’ve learned the hard way.
Connection brings risk. We’ve learned that with unprecedented connection comes equally unprecedented risk. Everyday devices plug our kids directly into the potential for cyberbullying, sexting, inappropriate content, and mental health issues. Over the past decade, parents, schools, and leaders have worked to address these risks head-on but we have a long way to go in changing the online space into an emotionally safe and healthy place.
Tech addiction isn’t a myth. To curb the negative impact of increased tech use, we’ve learned ways to balance and limit screen time, unplug, and digitally detox. Most importantly, it’s been confirmed that technology addiction is a medical condition that’s impacting people and families in very painful ways.
The internet remembers. We’ve witnessed the very public consequences of bad digital choices. Kids and adults have wrecked scholarships, reputations, and careers due to careless words or content shared online. Because of these cases, we’re learning — though never fast enough — to think twice about the behaviors and words we share.
We’re equipping vs. protecting. We’ve gone from monitoring our kids aggressively and freaking out over headlines to realizing that we can’t put the internet in a bottle and follow our kids 24/7. We’ve learned that relevant, consistent conversation, adding an extra layer of protection with security software, and taking the time to understand (not just monitor) the ways our kids use new apps, is the best way to equip them for digital life.
The parent-child relationship is #1. When it comes to raising savvy digital kids and keeping them safe, there’s not a monitoring plan in existence that rivals a strong parent-child relationship. If you’ve earned your child’s heart, mind, and respect, you have his or her attention and can equip them daily to make wise choices online.
The dark web is . . . unimaginably dark. The underbelly of the internet — the encrypted, anonymous terrain known as the Dark Web — has moved from covert to mainstream exposure. We’ve learned the hard way the degree of sophistication with which criminals engage in pornography, human trafficking, drug and weapon sales, and stolen data. With more knowledge, the public is taking more precautions especially when it comes to malware, phishing scams, and virus attacks launched through popular public channels.
There’s a lot of good going on. As much negative as we’ve seen and experienced online over the past decade, we’ve also learned that its power can be used equally to amplify the best of humanity. Social media has sparked social movements, helped first responders and brought strangers together in times of tragedy like no other medium in history.
Privacy is (finally) king. Ten years ago, we clicked on every link that came our way and wanted to share every juicy detail about our personal lives. We became publishers and public figures overnight and readily gave away priceless chunks of our privacy. The evolution and onslaught of data breaches, data mining, and malicious scams have educated us to safeguard our data and privacy like gold.
We’ve become content curators. The onslaught of fake news, photo apps, and filter bubbles have left our heads spinning and our allegiances confused. In the process, we’ve learned to be more discerning with the content we consume and share. While we’re not there yet, our collective digital literacy is improving as our understanding of various types of content grows.
Parents have become digital ninjas. The parenting tasks of monitoring, tracking, and keeping up with kids online have gone from daunting to doable for most parents. With the emotional issues now connected to social media, most parents don’t have the option of sitting on the sidelines and have learned to track their kids better than the FBI.
This is us
We’ve learned that for better or worse, this wired life is us. There’s no going back. Where once there may have been doubt a decade ago, today it’s clear we’re connected forever. The internet has become so deep-seated in our culture and homes that unplugging completely for most of us is no longer an option without severe financial (and emotional) consequences. The task ahead for this new decade? To continue working together to diminish the ugly side of technology — the bullying, the cruelty, the crime — and make the internet a safe, fun experience for everyone.