As of January 2015, Facebook Mobile hosts 745 million daily mobile active users who accounts for over 60% of all mobile posts published to any online social networking service. Though privacy can still be achieved, mobile users place their personal identity data at a greater risk when compared to users logging in via desktop computer. This is in large part due to the fact that mobile devices provide Facebook with a means to access additional location information, contact lists, photos, and other forms of personal data. Use the following recommendations to best protect yourself against oversharing.
Tag Archive for facebook
Department of Defense
DoD Online Privacy and Operational Security Smart Cards: Facebook
Facebook provides shortcuts to their privacy settings that help to limit what others can see in your profile. Select Privacy Checkup to change your basic privacy settings. For more extensive settings, click See More Settings. From there, navigate through the pages of the settings toolbar to control how your personal information is shared with others.
Corporate, Department of Justice
DoJ Community Oriented Policing Services Facebook, Twitter, YouTube Violent Extremism Awareness Briefs
Online radicalization to violence is the process by which an individual is introduced to an ideological message and belief system that encourages movement from mainstream beliefs toward extreme views, primarily through the use of online media, including social networks such as Facebook, Twitter, and YouTube. A result of radical interpretations of mainstream religious or political doctrines, these extreme views tend to justify, promote, incite, or support violence to achieve any number of social, religious, or political changes.
Facebook Outsourced Abuse Standards/Content Moderation Manual
A manual for the California-based outsourcing company oDesk is used by “live content” moderators of Facebook to provide standards for monitoring photos and postings in accordance with Facebook’s abuse and inappropriate content provisions. The manual was originally provided to Gawker by a 21-year-old Moroccan man who says he was paid $1 dollar an hour to scan Facebook for illicit content.
Facebook Law Enforcement Subpoena/Data Request Guidelines
A series of documents comprised of all publicly available versions of Facebook’s subpoena and legal compliance guides produced for law enforcement information requests. This site previously published the Facebook law enforcement guides from 2007-2010, which included a 2008 version of the manual that was originally published by Cryptome. The guides were referenced by privacy scholars and others in the media, yet Facebook would not even confirm to Reuters the authenticity of the documents. With two more editions provided by the latest #AntiSec leak (including a second expanded copy from 2010 and a shorter version from 2006), there are now 6 separate versions available from 2006-2010. All but one of the guides are labeled with version numbers documenting the evolution of the Facebook process for supplying user information to law enforcement.
Facebook Logged-Out User Tracking Patent
A method is described for tracking information about the activities of users of a social networking system while on another domain. The method includes maintaining a profile for each of one or more users of the social networking system, each profile identifying a connection to one or more other users of the social networking system and including information about the user. The method additionally includes receiving one or more communications from a third-party website having a different domain than the social network system, each message communicating an action taken by a user of the social networking system on the thirdparty website. The method additionally includes logging the actions taken on the third-party website in the social networking system, each logged action including information about the action. The method further includes correlating the logged actions with one or more advertisements presented to the one or more users on the third-party website as well as correlating the logged actions with a user of the social networking system.
Mirror of Utøya Gunman Anders Behring Breivik’s Facebook Page and Photo Gallery
Mirror of Utøya gunman Anders Behring Breivik’s Facebook page and photo gallery, provided because profiles on social networking sites are often removed after their owners engage in high profile criminal/terrorist activities.
Arizona, Intelligence Fusion Centers
(U//LES) Arizona Fusion Center Warning: Police Officers Targeted on Facebook
On October 28, 2010 a DUI traffic stop by MCSO uncovered a CD containing multiple photographs and names of over 30 Phoenix PD officers and civilian employees. All of the names and photographs found on the CD were obtained from Facebook and reveal the identity of several patrol and undercover officers. All officers who were identified on the CD have been notified. It is unknown how many more CDs (if any) may be circulating. This information is provided for Officer Safety and Situational Awareness purposes.
Open Source Center
(U//FOUO) Open Source Center Israeli Government Uses Social Media to Counter Flotilla Criticism
Against the backdrop of widespread international criticism and muted senior official comment regarding Israel’s actions in the Free Gaza flotilla raid, the IDF and some ministries, as well as individual volunteers, turned to social media to counter bad publicity over the incident. While IDF YouTube videos apparently succeeded in attracting attention to Israel’s message, the government’s overall social networking effort appears to have been hastily and clumsily organized compared to a more effective effort at the time of the Gaza incursion from December 2008 to January 2009. Several prominent commentators rebuked the government for what they perceived as a tardy and unprofessional public diplomacy campaign during the incident.
Morocco, Open Source Center
(U//FOUO) Open Source Center Morocco Bloggers Concerned After Facebook Arrest
In the wake of Fouad Mourtada’s conviction for impersonating Prince Moulay Rachid on facebook.com, Moroccan bloggers have voiced concern that his arrest sets a precedent for repressing bloggers who were formerly allowed to flourish. In contrast to the outpouring of sentiment on the Internet, Morocco’s mainstream press has thus far displayed only limited attention to the case. Moroccan security services arrested Fouad Mourtada, 26, an IT engineer from the southeastern town of Goulmima, on 6 February for creating a facebook.com profile in the name of King Mohammed VI’s brother, Prince Moulay Rachid on 15 January. Mourtada’s defenders argued that he clearly had no malicious intent since he used his home IP address instead of a cyber cafe and also argued that he did not expect his posting to be taken seriously since there are so many false celebrity profiles on facebook.com (French President Sarkozy has 41). Nevertheless, on 22 February, Mourtada was sentenced to three years in prison and a fine of 10,000 dirhams (approximately $1,350) (helpfouad.com). Beginning with prominent French-language blogger Larbi el Hilali on 7 February, Moroccan bloggers have charged that Mourtada’s arrest and conviction portends a government crackdown on Internet free speech.
Open Source Center, Thailand
(U//FOUO) Open Source Center Thai Social Media Anti-Red Shirt Campaigns
Thai academics have sounded the alarm over the appearance of online groups dedicated to harassing and mocking red-shirt members, warning the government’s failure to stop such campaigns could lead to further division and bloodshed. One of these newly emergent online groups, “Social Sanction”, posts personal information on red-shirt supporters and encourages its members to mete out “social punishment.” Academics warn these online campaigns, which they speculate the government quietly endorses, could create an environment “full of fear and hatred” and lead to open violence, outcomes at odds with ongoing government efforts to promote reconciliation.
Department of Homeland Security
(U//FOUO//LES) DHS Terrorist Use of Social Networking Facebook Case Study
Terrorists have traditionally sought to exploit new and alternative media, particularly on the Internet, to spread their propaganda and to a lesser extent, operational and tactical guidance to prospective supporters through websites, forums, blogs, chat rooms etc. In recent years, Islamic terrorists have expanded the purview of their online endeavors into social networking sites, websites that create and foster online communities organized around shared affinities and affiliations that connect people based on interests and relationships. In most cases, social networking sites are openly viewable to any participant on the site.
Confidential Facebook Law Enforcement Subpoena Guides 2007-2010
Four versions of the confidential law enforcement guide to requesting information from Facebook.
Department of Defense
How a Boy Becomes a Martyr: The Dangers of Web 2.0 Technology
The following report is a fictitious account of how a young person in America could become a suicide bomber for an Islamic extremist group. It is the fifth in a series of reports on Web 2.0 technology and future urban warfare. All references to people, groups, and products are intended for illustrative purposes only. As such, the authors do not suggest that any of the products or organizations listed condone or support extremist activities.