Facebook 'leaked' moderators' identities to suspected terrorists

June 17, 2017

San Francisco, Jun 17: : A report on Friday alleged that Facebook had put the safety of its content moderators at risk after accidentally exposing their personal details to suspected terrorist users of the social network.3000

As per The Guardian, a bug in the software, identified in late 2016, affected more than 1,000 workers across 22 departments at Facebook, who used the company"s moderation software to review and remove inappropriate content from the platform, including sexual material, hate speech and terrorist propaganda.

This all started after Facebook moderators started receiving friend requests from people affiliated with the terrorist organisations they were scrutinising.

It was later discovered by the company that the personal Facebook profiles of its moderators had been automatically appearing in the activity logs of the terror groups they were shutting down.

The report added that “of the 1,000 affected workers, around 40 worked in a counter-terrorism unit based at Facebook"s European headquarters in Dublin, Ireland. Six of those were assessed to be `high priority` victims of the mistake after Facebook concluded their personal profiles were likely viewed by potential terrorists.”

Upon coming to know about the glitch, one of the six workers fled Ireland and went into hiding in eastern Europe for five months.

The Iraqi-born Irish citizen, who is in his early twenties, said he found out that seven individuals associated with a suspected terrorist group he banned from Facebook – an Egypt-based group that backed Hamas and, he said, had members who were Islamic State sympathizers – had viewed his personal profile.

"The security glitch, which lasted for a month before Facebook was able to correct it in November, made the moderators' profiles appear in the notifications of Facebook groups that are thought to be administrated by terrorists with ties to Islamic State, Hezbollah and the Kurdistan Workers Party," the report quoted a moderator as saying.

The moderator revealed about his family's tryst with terrorism in the past - his father had been abducted and beaten, and his uncle executed in Iraq.

Confirming the security breach, a Facebook spokesperson told The Guardian that the website had made technical changes to "better detect and prevent these types of issues from occurring".

"We care deeply about keeping everyone who works for Facebook safe. As soon as we learned about the issue, we fixed it and began a thorough investigation to learn as much as possible about what happened," the spokesperson added.

After the leak was detected, Facebook convened a "task force of data scientists, community operations and security investigators".

The internal e-mails of Facebook revealed that the company warned all the employees and contracted staff it believed were affected, and also set-up an e-mail address, [email protected], to field queries from those affected.

"For those in the high-risk group, Facebook also offered counselling through its employee assistance program, over and above counselling offered by the contractor, Cpl. It also offered to install a home alarm monitoring system and provide transport to and from work to the six," the report said.

However, the moderator, who went into hiding, said that Facebook needed to do more to address their pressing concerns for their safety and families.

The moderator has filed a legal claim against Facebook and Cpl, seeking compensation for the psychological damage caused by the leak.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 19,2020

New Delhi, Jan 19: Messaging service WhatsApp which on Sunday faced issues in transmitting multimedia content including pictures and images, prompting social media users to share hilarious memes and messages, resumed regular services after over two hours.

#WhatsAppDown was the trending hashtag on Twitter for most part of Sunday afternoon in India along with several other countries such as Brazil, Europe and also parts of Middle-East including UAE, reported downdetector.in, a realtime problem and outage monitoring website.

Users of the popular messaging app were unable to send media files, stickers and GIFs.

Most users immediately went to Twitter to find out about the problem and check if others were facing the same issue.

Numerous tweets and memes took over the internet as soon as the news broke about the WhatsApp tech issue. After around two hours of technical glitch, the app resumed full service.

Even after full recovery of media transfer, people globally still continued checking the status of the messaging app.

WhatsApp has been one of the prime messaging apps since May 2009 and has recently collaborated with Facebook.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 4,2020

Twitter has joined efforts to do away with racially loaded terms such as master, slave and blacklist from its coding language in the wake of the death of African-American George Floyd and ensuing Black Lives Matter protests.

The project started even before the current movement for racial justice escalated following the death of 46-year-old George Floyd in police custody in May.

The use of terms such as "master" and "slave" in programming language originated decades ago. While "master" is used to refer to the primary version of a code, "slave" refers to the replicas. Similarly, the term "Blacklist" is used to refer to items which are meant to be automatically denied.

The efforts to change these terms in favour of more inclusive language at Twitter were initiated by Regynald Augustin and Kevin Oliver and the microblogging platform is now backing their efforts.

"Inclusive language plays a critical role in fostering an environment where everyone belongs. At Twitter, the language we have been using in our code does not reflect our values as a company or represent the people we serve. We want to change that. #WordsMatter," Twitter's engineering team said in a post on Thursday.

As per the recommendations from the team, the term "whitelist" could be replaced by "allowlist" and "blacklist" by "denylist".

Similarly, "master/slave" could be replaced by "leader/follower", "primary/replica" or "primary/standby".

Twitter, however, is not the first to start a project to bring inclusivity in programming language.

According to a report in CNET, the team behind the Drupal online publishing software started using "primary/replica" in place of "master/slave" as early as in 2014.

The use of the terms "master/slave" was also dropped by developers of the Python programming language in 2018.

Now similar efforts are underway at Microsoft's Github and LinkedIn divisions as well, said the report.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.