After Newtown tragedy, cops target social net pranksters
Connecticut State Police warn they will prosecute anyone posting false info, threatening
Computerworld - In the wake of the tragic school shooting in Newtown, Conn, police warned that they will prosecute anyone purposefully posting false information related to the incident on social networks.
"Misinformation is being posted on social media sites," said Connecticut State Police Lt. J. Paul Vance at a news conference Sunday, according to a report on NPR. "These issues are crimes. They will be investigated, statewide and federally, and prosecution will take place when people perpetrating this information are identified."
Vance pointed out that since last Friday's shooting at the elementary school, online posters have posed as the dead gunman, Adam Lanza, on social networking sites. Others have falsely taken on the identities of other figures in the involved in the incident and posted threatening messages. Twenty children and six adults were murdered Friday at Sandy Hook Elementary School in Newtown, Conn.
The tragedy has driven people around the world to express grief and offer support on social networking sites like Facebook, Twitter and Google+. People often find solace connecting with their online friends, even setting up memorial pages, experts say.
However, some people are also quick to spread false information after such an incident.
Zeus Kerravala, an analyst with ZK Research, said he's not surprised that police have threatened to arrest people who are posting false or threatening information online.
"Fake posts and tweets obstruct the investigation," he said.
He suggested that many people who post false information are seeking attention. "I think fake posts are for attention. Never underestimate an idiot in situations like this. For many people, negative attention is better than no attention," Kerravala said.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is firstname.lastname@example.org.
- Arrests made after international cyber-ring targets StubHub
- International police operation disrupts Shylock banking Trojan
- Spamhaus pushes for arrests of alleged DDoS participants
- Accused Russian point-of-sale hacker arrested, will face U.S. charges
- No-IP regains control of some domains wrested by Microsoft
- Microsoft legal action cramping other hacking campaigns, Kaspersky says
- Microsoft admits technical error in IP takeover, but No-IP still down
- QuickPoll: Why hasn't Windows XP come under attack from hackers?
- Cybercrime losses top $400 billion worldwide
- U.S., foreign agents disrupt Gamover Zeus botnet
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts