I recently assisted a family that suffered from the actions of a small group of misguided, radical, and dangerously fanatical persecutors who use the Internet as a force multiplier. This campaign degenerated into a violent attack on the children. Fortunately, the family has the support of the employer. The provided security driver got the children to safety before the attackers caused any serious injuries or death.
The family can’t sell their city home because of the risk this would pose to the new owners. Their country property was located by the radicals and the onslaught of harassment, vandalism, and arson started again. After vacating the country property, it must now be guarded around the clock like the vacant city home.
This type of crowd-sourced attack is something that executives and security professionals must deal with before it occurs. People who might be exposed to this risk will have to go through their lives to find the leads that motivated persecutors will use to find them. These leads will have to be removed, made irrelevant, or altered. This is not a small task and it is very difficult to do when things are peaceful. Doing it while under attack might be impossible because the attackers probably possess the data you would seek to remove or obscure.
Fanatical persecutors who use the Internet are a real danger. Not just a danger to one’s reputation, but to life itself. Korean Canadian hip hop artist Daniel Lee had his career severely damaged by an orchestrated campaign to cast doubt on his academic career at Stanford.
As a Wired article outlines, one disgruntled person can easily start a dangerous campaign to destroy a person’s reputation and that could lead to violence or dramatically alter the victim’s life as he tries to avoid the virtual lynch-mob that might materialize in real-life.
Recently, I have been involved in a series of jobs involving Operational Risk.
Operational Risk arises from:
- inadequate or failed processes and controls,
- external events
- contractual obligations
- compliance issues
Lawfare is the most interesting aspect of this type of work. Lawfare is a form of asymmetric warfare that is waged via the courts with the intention of damaging the firm. Special interest groups, radicals, and competitors will use this to create financial damage and create ill will towards the targeted company.
The Investigator’s task is usually to identify the funding sources and relationship of the plaintiff to individuals and groups who would benefit from the use of this tactic.
Two articles on the Brand Killer Robots blog drew my attention. Not because the data offered anything new, but that Stephen Ryan was able to create a bot to clearly show that insiders, employees, and former employees are the most likely to launch cyber attacks.
Raps BOT : Predicts Insider Cyber Terrorism Threat HIGH
Raps Bot : Sniper Attack Methods – Number 1 Cyber Terrorism Threat
Wikipedia’s just announced plans to restrict the editing of some of its articles. Under the new system, any changes made to pages of still-living people will have to be approved by an “experienced volunteer” before going online.
The 15 biggest Wikipedia blunders is a must read for anybody interested in reputation management.
I started with a very interesting article about what you might find in a college newspaper that would be interesting to an investigator.
One thing leads to another and I also found an article about a study of how quickly social sites remove pictures. Some sites take up to 30 days to really get rid of the offending images. This is an important thing to understand if your are looking for derogatory pictures.
Once the cat is out of the bag, you probably won’t be able to catch her and stuff her back inside…
That (now) embarrassing article you wrote for your college newspaper three years ago? It’s still online. And when people Google you, they find it…
Apparently a lot of student newspapers are receiving requests from former student writers to remove or “hide” (from Google) articles of which they are now ashamed…
…requests by former students who were featured in articles in the student newspaper. Campus police arrests for drunkenness, that sort of thing. They would like those articles to be removed or “hidden.”…
Here’s a related story about someone trying to get an old newspaper story erased from the search engines. Article published in The Seattle Times on Aug. 15, 2008.
Cambridge researchers have shown that photos aren’t always deleted when users ask, causing a major ‘data remanence’ issue for cloud computing.
According to a study of 16 social networking, blogging and photo sharing sites…most of them failed to remove photos after users deleted them…
An excellent article at Knowledge Is Power about using a blog to spread FUD (fear, uncertainty, doubt) about competitors and manage the spin on news about its rivals while usually reporting positively about your own employer.
Another post about Black PR defines this as distinct from a disinformation campaign.
The US Government Accountability Office says that stolen sensitive military items have been purchased by undercover government officials on Craigslist and eBay. However, this is like the kettle calling the pot black. The same subcommittee determined that the Defense Department sold chemical protective suits and biological warfare laboratory equipment to the public.
While it is easy to see an element of fear mongering in this, it does remind us that private sector businesses should be checking eBay and Craigslist for their own product and counterfeits. Doing so may reveal a problem with theft, grey marketing, or counterfeiting.
An article about Online Reputation Monitoring for Competitive Intelligence has let the cat out of the bag — there are investigative tools to get more from the Internet than you will find with simple search strings.
There are tools for searching Google to uncover details about your company that you would never think of publishing freely, tools for searching social networks to locate competitive intelligence information from employees or ex-employees, tools for digging into content to locate copyright materials and tools for conducting linguistic scans for flagging up dirty words associated with your products or derogatory associations with your brand.
A growing proportion of our research is directed at reputation management efforts. It is very easy for someone to put up a Web site or Blog that libels a company or person anonymously.
I found two excellent articles about companies that claim to erase, or at least push lower in the search engines results, negative comments about a company. The first, is on an MSNBC Blog called The Red Tape Chronicles and the second is on Forbes.
I have no idea about the effectiveness of these services, but they represent an interesting concept.