Digital Assassination

Protecting your reputation, brand or business against online attacks


“In the future, which is now, everyone will have 15 minutes of shame.”

Two leading reputation experts reveal how online attacks destroy brands, reputations, even lives...and provide a course of actions to turn the tables on digital assassins.


Social Blocking: Censorship or Sanity?

August 11, 2014

Social Blocking, Social Media CensorshipTrolls and griefers have long resorted to using impersonation to sow the seeds of dissention among targets ranging from businesses to feminists.  When that fails, they often resort to creative but coarse threats.  Now tech editor Glenn Fleishman has a proposal on Boing Boing to combat these terror campaigns with a new tool he calls “collaborative social blocking.”

Fleishman explains:

With collaborative blocking, a group of people creates a list of accounts to block or, in some cases, mute. The list is propagated through a Web-based app that allows people to opt-in with a Twitter account, authorizing the app to carry out certain behavior on their behalf. Twitter allows clients and specialized apps to block, mute, and unfollow, among other actions.

Some will cry censorship.  Social blocking, if it works, would affirm the right of free association and the ability of groups to hold sensible dialogues, free from fear.

Comments

Teen Suicide, Redux, Redux

July 17, 2014

Another teen humiliated on social media.  Another suicide, this one in San Diego.
The death of Matthew Burdette, 14-year-old Boy Scout, water polo and wrestling team athlete, came on the heels of an embarrassing video posted on Vine and SnapChat.  This led to Matthew being mercilessly teased and bullied at school.
To be fair, his tormentors were not young adults.  They are kids, too.
The remarkable thing about this story is how unremarkable it is.  It is depressingly similar to a dozen incidents harking back to Rutgers student, Tyler Clementi. 
In the past, a rumor about someone’s private life could spread from person to person.  The images of Matthew Burdette were shot out around the world, instantly.  They will live on forever.
Cyber Bullying StatisticsAnother teen humiliated on social media.  Another suicide, this one in San Diego.

The death of Matthew Burdette, 14-year-old Boy Scout, water polo and wrestling team athlete, came on the heels of an embarrassing video posted on Vine and SnapChat.  This led to Matthew being mercilessly teased and bullied at school.

To be fair, his tormentors were not young adults.  They are kids, too.

The remarkable thing about this story is how unremarkable it is.  It is depressingly similar to a dozen incidents harking back to Rutgers student, Tyler Clementi. 

In the past, a rumor about someone’s private life could spread from person to person.  The images of Matthew Burdette were shot out around the world, instantly.  They will live on forever.
.
Comments

U.S. Charges Five Chinese Military Officers With Spying

May 20, 2014

“When these cyber-intrusions occur, production slows, plants close, workers get laid off and lose their homes.”
-David Hickton, U.S. Attorney for the Western District of Pennsylvania
By Michael Riley, Chris Strohm and Del Quentin Wilber - May 19, 2014
The U.S. dramatically escalated its battle to curb China’s technology theft from American companies by accusing five Chinese military officials of stealing trade secrets, casting the hacker attacks as a direct economic threat.
The indictment effectively accuses China and its government of a vast effort to mine U.S. technology through cyber-espionage, stealing jobs as well as the innovation on which the success of major global companies like United States Steel Corp. (X) and Alcoa Corp. (AA) depends.
While hundreds of U.S. entities have been penetrated by Chinese military hackers since 2002, the Justice Department focused on five companies specializing in solar panels, metals and next-generation nuclear power plants. Four companies are headquartered or have main offices in Western Pennsylvania and officials calculated the toll in human terms.
“When these cyber-intrusions occur, production slows, plants close, workers get laid off and lose their homes.”

-David Hickton, U.S. Attorney for the Western District of Pennsylvania

By Michael Riley, Chris Strohm and Del Quentin Wilber - May 19, 2014
Bloomberg

The U.S. dramatically escalated its battle to curb China’s technology theft from American companies by accusing five Chinese military officials of stealing trade secrets, casting the hacker attacks as a direct economic threat.
Chinese Officials Arrested, Spying on U.S. Companies
The indictment effectively accuses China and its government of a vast effort to mine U.S. technology through cyber-espionage, stealing jobs as well as the innovation on which the success of major global companies like United States Steel Corp. (X) and Alcoa Corp. (AA) depends.

While hundreds of U.S. entities have been penetrated by Chinese military hackers since 2002, the Justice Department focused on five companies specializing in solar panels, metals and next-generation nuclear power plants. Four companies are headquartered or have main offices in Western Pennsylvania and officials calculated the toll in human terms.

Continue reading on Bloomberg.com

Comments

Social Media's Shopping Spree

April 29, 2014

Facebook Purchases

In our book, we predicted that our “mirror” (Facebook) would come to look more like our “window on the world” (Google), leading to a new age of “social search,” in which we will be increasingly led by the preferences of our digital herds.

Well, a funny thing happened on the way to the convergence.  Google+ and Facebook are finding that consumers resist living their entire social media lives on one platform.  This is especially true for mobile users.  So the big players are diversifying, buying up popular apps and services (like Vine, Instagram and WhatsApp, leaving them with their separate brands) in order to silently share our data behind the scenes.

Read more about 'Why the Social Networks Are Falling Apart' on CIO.com.
.
Comments

Click here to see our blog archive