After Newtown tragedy, cops target social net pranksters
Connecticut State Police warn they will prosecute anyone posting false info, threatening
Computerworld - In the wake of the tragic school shooting in Newtown, Conn, police warned that they will prosecute anyone purposefully posting false information related to the incident on social networks.
"Misinformation is being posted on social media sites," said Connecticut State Police Lt. J. Paul Vance at a news conference Sunday, according to a report on NPR. "These issues are crimes. They will be investigated, statewide and federally, and prosecution will take place when people perpetrating this information are identified."
Vance pointed out that since last Friday's shooting at the elementary school, online posters have posed as the dead gunman, Adam Lanza, on social networking sites. Others have falsely taken on the identities of other figures in the involved in the incident and posted threatening messages. Twenty children and six adults were murdered Friday at Sandy Hook Elementary School in Newtown, Conn.
The tragedy has driven people around the world to express grief and offer support on social networking sites like Facebook, Twitter and Google+. People often find solace connecting with their online friends, even setting up memorial pages, experts say.
However, some people are also quick to spread false information after such an incident.
Zeus Kerravala, an analyst with ZK Research, said he's not surprised that police have threatened to arrest people who are posting false or threatening information online.
"Fake posts and tweets obstruct the investigation," he said.
He suggested that many people who post false information are seeking attention. "I think fake posts are for attention. Never underestimate an idiot in situations like this. For many people, negative attention is better than no attention," Kerravala said.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is firstname.lastname@example.org.
- Nine charged with distributing Zeus malware
- The new security perimeter: Human Sensors
- Cyberattacks could paralyze U.S., former defense chief warns
- Security Manager's Journal: Thousands of dollars in phone calls? Management hates that.
- Everything You Know About Enterprise Security Is Wrong
- UK man charged with hacking Federal Reserve
- McAfee Offers Global Response to Nationalized Malware
- Tech Industry Praises Cybersecurity Framework From White House
- Ransomware like Cryptolocker uses Bitcoin, other virtual currencies for payment
- Trial for alleged Silk Road creator Ross Ulbricht set for November
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts