Facebook auto-generates terror content: Whistleblower

Agencies
May 11, 2019

Facebook is actively creating new terror content on the website with its auto-generation feature, alleges a whistleblower who analysed over 3,000 Facebook profiles of individuals expressing affiliation with terror or hate groups.

The social networking giant last year claimed that with the use of advanced Artificial Intelligence (AI) technology and a growing team of expert human reviewers it could now block 99 per cent of the terrorist content of Islamic State (IS), Al Qaeda, and affiliated groups before it was reported by users.

The study by the anonymous whistleblower working with the US-based non-profit National Whistleblower Center showed that terror and hate speech content are proliferating on Facebook.

The whistleblower found that 317 profiles out of the 3,228 surveyed contained the flag or symbol of a terrorist group in their profile images, cover photo, or featured photos on their publicly accessible profiles.

The five-month study also detailed hundreds of other individuals who had publicly and openly shared images, posts, and propaganda of the IS, Al Qaeda and other known terror groups, including media that appeared to be of their own militant activity.

Alleging that Facebook is likely breaking the law by "misleading" shareholders about terror and hate content, the whistleblower has filed a petition with the US Securities and Exchange Commission.

After the five-month study period ending in December 2018, the whistleblower found that terror and hate content generated by Facebook is "Liked" by thousands of Facebook users.

These Likes provide yet another means for individuals affiliated to extremist groups to network and recruit, the study said.

Facebook came under increased scrutiny after the New Zealand mosque shooting in March was live streamed on the platform.

Co-founder of the social networking site Chris Hughes earlier this week stressed that it is time to break up Facebook and said the government must hold its CEO Mark Zuckerberg "accountable".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 26,2020

New Delhi. May 26: 6,535 more coronavirus cases have been reported in India in the last 24 hours, taking the total number of COVID-19 cases in the country to 1,45,380, informed Union Ministry of Health and Family Welfare on Tuesday.

Out of the total, at present, there are 80,722 active cases in the country. So far, 60,490 people have been cured/discharged and 4167 have died due to the lethal infection.

According to the data compiled by the Centre, Maharashtra has so far recorded the maximum number of cases of COVID-19 across the country with 52,667 people.

The tally of cases in Tamil Nadu has risen to 17,082. While Gujarat has recorded 14,460 cases of the infection so far.

There are 14,073 cases of coronavirus in the national capital.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
coastaldigest.com news network
May 4,2020

Mangaluru, May 4: No major crowds were seen in the coastal city of Mangaluru today except in front of the liquor shops after the district administration relaxed the lockdown norms for 12 hours a day (between 7am and 7pm).

There was no mad rush of vehicles either on city roads when the relaxed lockdown began. There were fewer people to buy essentials in front of grocery and vegetable shops as they had time till late evening.

There was no let down in the number of police pickets as well as curbs on vehicular movement across the city either. 

The government has allowed sale of liquor in CL2 (standalone wine shops) and CL 11 (MSIL outlets) to mop up revenues when Lockdown-3 commenced from Monday. Compared the other parts of Karnataka, the size of queues in front of liquor shops in Mangaluru were smaller. 

Like other parts of the country, the lockdown was imposed in the coastal district on March 24 to prevent the spread of Covid-19. Prior to that, a curfew was imposed in the district from March 22 midnight. The lockdown did not apply to essential services such as sale of food, groceries, milk, vegetables, fruits, and meat and fish. Gradually the district administration had to intensify the lockdown and allow those shops to remain open only between 7 a.m. and 12 noon. 

With the lockdown relaxation extending till 7 p.m., Mangaluru today witnessed people and private vehicles moving freely in the afternoon for the first time in more than a month. However, only those who had to go for work and do other essential activities were seen on roads. After 7 p.m. movements of all kinds of vehicles will be prohibited. 

The relaxation was to facilitate economic activities that had come to a standstill during the first two phases of lockdown. Mangaluru City Police Commissioner Dr P S Harsha, meanwhile, warned the people against misusing lockdown relaxation and venturing out without any genuine reason.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.