After Newtown tragedy, cops target social net pranksters
Connecticut State Police warn they will prosecute anyone posting false info, threatening
Computerworld - In the wake of the tragic school shooting in Newtown, Conn, police warned that they will prosecute anyone purposefully posting false information related to the incident on social networks.
"Misinformation is being posted on social media sites," said Connecticut State Police Lt. J. Paul Vance at a news conference Sunday, according to a report on NPR. "These issues are crimes. They will be investigated, statewide and federally, and prosecution will take place when people perpetrating this information are identified."
Vance pointed out that since last Friday's shooting at the elementary school, online posters have posed as the dead gunman, Adam Lanza, on social networking sites. Others have falsely taken on the identities of other figures in the involved in the incident and posted threatening messages. Twenty children and six adults were murdered Friday at Sandy Hook Elementary School in Newtown, Conn.
The tragedy has driven people around the world to express grief and offer support on social networking sites like Facebook, Twitter and Google+. People often find solace connecting with their online friends, even setting up memorial pages, experts say.
However, some people are also quick to spread false information after such an incident.
Zeus Kerravala, an analyst with ZK Research, said he's not surprised that police have threatened to arrest people who are posting false or threatening information online.
"Fake posts and tweets obstruct the investigation," he said.
He suggested that many people who post false information are seeking attention. "I think fake posts are for attention. Never underestimate an idiot in situations like this. For many people, negative attention is better than no attention," Kerravala said.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is firstname.lastname@example.org.
- Kicking the stool out from under the cybercrime economy
- Chinese man indicted over theft of Boeing C-17 secrets
- The making of a cybercrime market
- Arrests made after international cyber-ring targets StubHub
- International police operation disrupts Shylock banking Trojan
- Spamhaus pushes for arrests of alleged DDoS participants
- Accused Russian point-of-sale hacker arrested, will face U.S. charges
- No-IP regains control of some domains wrested by Microsoft
- Microsoft legal action cramping other hacking campaigns, Kaspersky says
- Microsoft admits technical error in IP takeover, but No-IP still down
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts