After Newtown tragedy, cops target social net pranksters
Connecticut State Police warn they will prosecute anyone posting false info, threatening
Computerworld - In the wake of the tragic school shooting in Newtown, Conn, police warned that they will prosecute anyone purposefully posting false information related to the incident on social networks.
"Misinformation is being posted on social media sites," said Connecticut State Police Lt. J. Paul Vance at a news conference Sunday, according to a report on NPR. "These issues are crimes. They will be investigated, statewide and federally, and prosecution will take place when people perpetrating this information are identified."
Vance pointed out that since last Friday's shooting at the elementary school, online posters have posed as the dead gunman, Adam Lanza, on social networking sites. Others have falsely taken on the identities of other figures in the involved in the incident and posted threatening messages. Twenty children and six adults were murdered Friday at Sandy Hook Elementary School in Newtown, Conn.
The tragedy has driven people around the world to express grief and offer support on social networking sites like Facebook, Twitter and Google+. People often find solace connecting with their online friends, even setting up memorial pages, experts say.
However, some people are also quick to spread false information after such an incident.
Zeus Kerravala, an analyst with ZK Research, said he's not surprised that police have threatened to arrest people who are posting false or threatening information online.
"Fake posts and tweets obstruct the investigation," he said.
He suggested that many people who post false information are seeking attention. "I think fake posts are for attention. Never underestimate an idiot in situations like this. For many people, negative attention is better than no attention," Kerravala said.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is email@example.com.
- Nine charged with distributing Zeus malware
- The new security perimeter: Human Sensors
- Cyberattacks could paralyze U.S., former defense chief warns
- Security Manager's Journal: Thousands of dollars in phone calls? Management hates that.
- Everything You Know About Enterprise Security Is Wrong
- UK man charged with hacking Federal Reserve
- McAfee Offers Global Response to Nationalized Malware
- Tech Industry Praises Cybersecurity Framework From White House
- Ransomware like Cryptolocker uses Bitcoin, other virtual currencies for payment
- Trial for alleged Silk Road creator Ross Ulbricht set for November
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Cybercrime and Hacking White Papers | Webcasts