An integrity threat

(Article updated 2 March 2015)
There are many who speak about the pros and cons of social media, but the real threats are seldom discussed even if people are exposed to them daily. I have chosen to be very active in my networking and it has given both visibility and insights about how vulnerable we are. I have friends who have been fooled by fake profiles on Facebook and we are getting more of fake contacts, which concerns. But a worse threat is the lack of integrity and increasing surveillance!

orwell-was-right-1

Several of my contacts are suffering from massive attacks by people who create fake profiles on Facebook and posting insulting and threatening images and texts. Despite the horrible words and pictures and reported to the police nothing has been done. Facebook says they will not address the problem, so why they have a rule only allowing one account per person where you have to enter your birth date and name if they don’t care?

It’s a lot to say about security and as a security expert at IBM said a couple of years ago, the worst is not the threats it’s when it’s quiet and we have a false feeling of security and not notice. I am a member of one of the teams, Cloud Sweden where security in the cloud are discussed and we address issues such as how we can use the cloud “social media” in a safer way. See “Legal issues when moving to the cloud – a checklist

Confidentiality is achieved by creating the ability to prevent unauthorised persons from gaining access to one’s own data. In certain circumstances, legal requirements set explicit demands that certain information shall be given confidentiality protection in this way; one of the best examples is the framework of the Official Secrets Act (2009:400). Confidentiality requirements need to be addressed in the contract with the provider of cloud services.

Do you know who are seeing you on Internet? ‪#CommunicationSkills‬ ‪#‎Integrity. A start to at least understand some of the basics of digital networks and Internet Security and why you need to be careful! See LifeHackers “How to Tap Your Network and See Everything That Happens On It“.

LifeHacker

Our security in social media depends on how easy we make it for antisocial behavior and those who want to exploit us. Unfortunately, it is becoming more common as the more people use social media. Apps and mobiles usage are increasing and many have no clue what a secure login etc is about and if an app to the bank or Facebook suddenly have another link. Who checks all the time if they really are on the right URL when logging in on a “smartphone”?

An Android Trojan app called PowerOffHijack, which originated from Chinese app stores, was found tricking users into believing that their devices were turned off though they’re actually powered on.

Passwords and “Hi jacking” is often prepared via “fun” apps and links that automatically retrieves your info. It could be a funny game and other things that attracts you to click. Phishing attempts to get hold of your passwords to bank etc. and “Scam” fraud and cheating has been around for a long time on the mail, but now it starts to get into social media too.

Mikael Drakenberg is a great researcher who send tips with the latest books. “Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do about It” by Marc Goodman is one of the books he suggest, another is. “Hate Crimes in Cyberspace” by Danielle Keats Citron which is quoted below.

“Massive reservoires of personal data are gathered by private and public entities. Companies track and analyze our online activities to assess our attractiveness as potential customers and far more. Government is collecting, analyzing, and sharing information about us, including our online communications, providing agents with contemporary and perpetual access to details about everywhere we go and everything we do, say, and write, while using or in the company of networked technologies” (Keats Citron. 2014:224). Danielle Keats Citron is the Lois K Macht Research Professor of Law at the University of Maryland Francis King Carey School of Law.

Privacy is not negotiable and should be built in the system we are using -Mikko Hypponen

A question except for the common talk about terrorism is why they are spying and tapping citizens on information of their daily interaction and want access to peoples computers. I think Ray Kurzweil, Google’s director of engineering and futurist has given one of the answers, he is a so called transhumanist who are seeking immortality.

Mr. Kurzweil is quick to add that Google isn’t working on brain nanobots. But he imagines that once our neocortex’s are connected to the cloud—something he expects will happen in the 2030s—this wireless connection will make us much smarter. “Somebody’s approaching and I need to think of something clever, and if my neocortex doesn’t cut it, I’ll be able to access more neocortex in the cloud,” he says.

Some simple advices:

  1. Never save private things on a computer/mobile connected to Internet
  2. Various/difficult password for each platform and update every three months
  3. Check new “friends” history and presence in social media from blogs etc.
  4. Do not click on the accompanying links if not known “search” by name/mail
  5. Use a search engine which respect your privacy 5 alternatives to Google
  6. Be careful with third party apps before approving access to fb twitter etc.
  7. Be prepared mentally to be hi jacked and remain calm if and when it happens
  8. Check the source if you receive threats before spreading to friends
  9. See all contacts and platforms as a potential threat. Check names and numbers
  10. Common sense! If it looks too good and attractive think twice before accept

I am interested and grateful for your views and experiences. Please add comments with links to reading more since this is a threat to everyone’s safety and integrity online.

Welcome to visit and follow eMindSet’s blog where I am writing together with Veronica Rebora.

EMindSet

Advertisements

One thought on “Are you in control of your presence and threats in Social Media?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s