Facebook issues

Phoenix

Ninja
New Phishing Scams Hitting Facebook Users
by Terrence O'Brien — May 22nd 2009 at 2:23PM

Facebook phishing scams simply refuse to die. First, it was FBAction.net, then a series of links with domains ending in ".im", and now links ending in ".at." All of these scams have one thing in common: They're designed to trick you into handing over your Facebook login information and hijack your account.

The AllFacebook blog reports that people are receiving e-mails and messages in their inboxes with links such as "areps.at." Clicking it takes you to a fake Facebeook login page. If you enter your information, the site will quickly login to your account and change your password, blocking you from Facebook,. It will then forward a malicious link to all of your friends via your account.

Also links with bests.at, kirgo.at, and nutpic.at in the address are also making the rounds. These also take you to the same scam site.

Lastly, as we were writing this post, we received, in our very own Facebook in-boxes, another Facebook phishing scam! This particular e-mail, which was sent from one of our friends whose Facebook account had been hacked and used to send out scam e-mails, had an innocent enough subject line -- "Hi." Then, inside, the message simply said "Look at goodmall.be." That's it. We clicked on the link and were taken to a fake Facebook page. So, watch out for that one as you're making the online rounds this weekend. Have you ever been the victim of phishing?

Facebook has been getting pounded by scammers recently, and this is only the latest skirmish. The good news is that the social network seems to be winning these battles by quickly deleting all references to the scam sites and shutting down spam accounts. It might be winning the battles, but our experience with phishing scams in general is that winning the overall war is still up for grabs. After all, phishers are nothing more than glorified, 21st-century grifters, which is probably the world's second oldest profession.

Elderly Amish Man Caught on Film With Prostitute, Blackmailed
When a 75-year-old Amish widower slept with a prostitute, he -- we feel certain -- felt pretty bad about it the next morning. As if that guilt weren't enough for the old man, the prostitute and her boyfriend demanded $67,000 from him, claiming that they had filmed the scene with wall-mounted cameras and would upload the recording to the Internet. The pair was later arrested and, we can only imagine, the Amish man abhorred technology more than ever.


Bank Robber Gets Away With the Help of Craiglist
In October, a bank robber -- wearing a safety vest, blue shirt, face mask and goggles -- eluded police with the help of Craiglist. Just outside the bank, while the robbery was in progress, stood a group of men who were responding to a Craiglist day labor opportunity. As the advertisement required, they were all wearing safety vests, blue shirts, face masks and goggles.


Nude New Zealander Arrested After Responding to Fake Sexy Text Message
Late in 2007, a Wellington, New Zealand man received a racy text message from two anonymous "ladies," giving him only an address and a request that he show up naked. Well, he indeed showed up naked... at the home of one appalled, unsuspecting New Zealander. Both the nude Romeo and the sadistic texter were arrested, though neither were prosecuted.


Fake Craiglist Ad Costs Man Most of What He Owns
Last Spring, a post appeared on an Oregon Craigslist board stating that the owner of a specific house was leaving all of his worldly possessions (still in said house) to whoever wanted them. When homeowner Robert Salisbury rushed home -- on a tip from a woman suspicious about the offer of a free horse -- he found his house being ransacked by 30 strangers. We suggest he take that horse and collect some vengeance Clint Eastwood-style.


17-Year-Old Jailed for Stealing Virtual 'Furniture'
When a 17-year-old Dutch boy hacked into several accounts on the Second Life-style site 'Habbo' in 2007, the the law got involved. The boy was discovered to have stolen $5,800 worth of virtual furniture and knick-knacks. Apparently, crime -- whether actual or virtual -- does not pay.


Phishers Going After Your Phones in New 'Vishing' Trend
Over the past year, sneaky spammers have begun to forsake the worn-out territory of e-mail in favor of cell phones' fertile frontier. The result? "Vishing." Get it? Voice mail + phishing. It might be more ominous if it didn't sound like a James Bond villain saying, "Wishing."


Burglars Break Into Restaurant, Steal HDTV, Leave Money / Food Behind
Around Halloween of last year, a truckload of thieves drove into -- that's right, into -- a Pennsylvania Mexican restaurant, where they -- apparently uninterested in the cash register -- stole a mid-grade 47-inch HDTV and fled the scene. We've all heard about how this generation is lacking in ambition, but this generation's thieves, too?
 

mysteryquest

Member.
Email scam targets Facebook users: Web security firm

Email scam targets Facebook users: Web security firm

Apparently related to: http://antifraudintl.org/showthread.php?t=34899

Wed Mar 17, 11:45 PM

WASHINGTON (AFP) - Computer hackers are targeting Facebook users with an email scam that attempts to steal their passwords, Web security firm McAfee said.

McAfee said on Wednesday some users of the world's most popular social networking site were receiving emails that appeared to be from Facebook informing them their Facebook password had been reset and to click on an attachment to retrieve it.

The security firm said the attachment is actually a "password stealer" that is installed when a user clicks on it and can potentially access any username and password combination on that computer, not Facebook-related information.

"This threat is potentially very dangerous considering that there are over 350 million Facebook users who could fall for this scam," McAfee said in a statement.

The subject line of the scam email reads: "Facebook Password Reset Confirmation! Customer Support."

McAfee advised anyone receiving the password-reset message to delete it and to not open the attachment.

Because of its huge membership, Facebook is a frequent target of computer hackers seeking to steal passwords.

In its 2010 Threat Predictions report released in December, McAfee said email "was increasing in popularity as the preferred method for targeting attacks against individual users, corporations and government institutions."

http://ca.news.yahoo.com/s/afp/100318/technology/us_it_company_computer_security_internet_facebook_mcafee?printer=1
 

Miyuki

Administratrix
Staff member
Facebook problems

http://www.bbc.co.uk/news/uk-northern-ireland-19375455

24 August 2012 Last updated at 17:34 GMT

Fake Facebook voucher offer scam

Chris Page By Chris Page BBC NI reporter

If you see a post on a friend's Facebook page offering you a £175 Tesco voucher, and think it's too good to be true - it is.

You are invited to share the offer on your Facebook page, and post the comment 'Thanks Tesco'.

The page that pops up when you click to claim the fake offer contains Tesco's logo, branding and company slogan.

But after posting to your own Facebook page, you are automatically redirected to another website.

Warned off

If you have anti-virus software, this is where you may be warned off.

But dozens of people have fallen for the sophisticated scam.

Dr Kevin Curran, who is a computing expert at the University of Ulster, says that scams that operate through social networking sites are on the rise.

This is because email filters are so good now that scammers don't often have success in that field.

So they're trying to use social media to reach people.

Dr Curran says: "Scammers can make money from the third party online surveys, where they get people to go to these pages and get money for each survey completed.

"They can also drive people to websites where they display their own ads.

"Or they can try to direct you to a website where you download software that can do worse things to your computer - and then they can get your personal details."

But the social networking sites are working hard to detect scammers.

Wary
Tesco say they're working with Facebook and other web firms to remove scams like this from the internet.

They say protecting customers is their "number one priority", and they alert people to scams that illegally use the company's name as soon as possible.

They've been issuing warnings on their website and official Facebook page.

The Trading Standards Service in Northern Ireland say they have not received any complaints or inquiries about this particular scam.

But they're advising people to be wary of any offer from a major retailer which has not been sent directly from that retailer - because genuine supermarket vouchers are normally sent by post or given out in stores.

And IT experts are reminding people to make sure their anti-virus software is kept up-to-date..
 

Kat

Administrator
Staff member
Facebook Hacked In 'Sophisticated Attack,' Company Reveals

Posted: 02/15/201

Gerry Smith Become a fan

Gerald.Smith@huffingtonpost.com

Facebook said Friday that its internal computer network was breached in "a sophisticated attack" last month, but said no user data was compromised.

The attack occurred when employees of the social network visited an infected website belonging to a mobile developer. The compromised site downloaded malicious software, or malware, onto employees' laptops. Facebook did not name the developer whose website caused the attack.

"As soon as we discovered the presence of the malware, we remediated all infected machines, informed law enforcements, and began a significant investigation that continues to this day," the company said in a blog post Friday......

Full details at http://www.huffingtonpost.com/2013/02/15/facebook-employees-laptop_n_2697599.html
 

xmanhere

Ninja
Cyber attacks spread via Facebook double in one year

Cyber attacks spread via Facebook double in one year

http://uk.news.yahoo.com/cyber-attacks-spread-via-facebook-double-in-one-year-095723515.html

Sharing posts on Facebook has become much more dangerous over the past year, say security experts Norton - scams targeting the social network have doubled.


Sharing posts on Facebook has become much more dangerous over the past year - scams targeting the social network have doubled.

Scams often take the form of links shared via the social network - fake videos, or links to offers such as free iPads - which try to trick unsuspecting users into downloading files or handing over credit card details.

The volume of spam email has actually fallen, as criminals switch to these new, more effective tactics. The rise was reported in the Norton 2013 Internet Security Threat Report, released today.

Using smartphones such as Android has also become much more risky in the past 12 months - with malicious software targeting smartphones rising by 58%, aiming to siphon information directly from phones.

Using iPhones seems to be a safer choice - only one threat was detected for Apple's operating system in 2012, compared to 103 for Google's Android, the world's most popular mobile OS.

[Related: Are smart watches the next big trend in tech?]

A third of mobile malware was designed to steal information with 15% aiming to track the user and 8% hoping to reconfigure a device.
More sinisterly, there was a 42% rise in targeted attacks last year - where cyber criminals research the personal information, jobs and interests of victims before sending emails.

A third of such attacks were directed against small businesses - with criminals aiming to fool employees into clicking infected links by masquerading as colleagues or as IT departments.

Even legitimate websites have become sources of infection - with "Watering Hole" attacks targeted at popular websites, aiming to infect visitors.

One major site targeted in one attack was related to human rights.

Ransomware is another increasing problem - targeting web users who might feel guilty about the sites they have visited. A huge warning seeming to be from the police flashes on screen, demanding money for a "fine".

Computers are often locked until users pay up - and the tactic is surprisingly successful.
Norton's security expert Richard Clooke said: "It is now becoming more sophisticated than ever, belittling and threatening consumers into paying large sums."

Many users stump up the amounts asked for - which range from $50 to $400 - in order to release their computer from the scammers' grip, as they fear they may have done something wrong and so don't want to own up just in case.

The report warned: "The ransom is presented as a fine for criminal activity online. In some cases, ransomware also takes a photo of the victim using a webcam and displays this image in the locking screen, which can be unnerving for victims."

Mr Clooke said: "There are so many common misconceptions around online security, as seen in this year's report.

"The results have shown it is still crucial for Norton to continue to educate consumers on how they can help protect themselves from acts of cybercrime."

One such misconception is that Mac owners are safe. However, the report warns one single threat was found to infect 600,000 Apple computers during 2012.

There was some good news, however, with email spam volumes decreasing once again. These still account for 69% of all messages received though, with half now related to dating and sexual themes, which accounted for just 3% back in 2010.

During 2012, one in 291 emails were judged to contain viruses with one in 414 messages being related to phishing. However, in the UK it becomes more prevalent, according to Norton, with the numbers becoming more common. Here one in 163 are viruses and one in 191 are related to phishing, making the UK the third most popular destination for the scams.

There was also an increase noted in the levels of industrial espionage and data theft with manufacturing industries the most targeted, facing double the number of attacks compared to those aimed at Government.

Major threats during 2012 included a data breach at LinkedIn, which exposed millions of accounts; Windows malware discovered in Apple's App store within an application; and hackers exploiting a vulnerability in Tumblr to spread spam.

In total, 5291 new vulnerabilities were discovered in 2012, up from 4989 in 2011 but actually down from the 6253 found in 2010. However, new mobile vulnerabilities were up to 415 last year compared to just 163 two years previously.

Apple's Safari web browser was said to have the most vulnerabilities in 2012, followed by Google Chrome, Mozilla Firefox and then Microsoft's market-leading Internet Explorer.

Looking ahead, Norton experts warn of a rise in State-sponsored cyber attacks as well as those by national activists. They also believe the increase in smartphone social network use by teenagers will become the next battleground for cybercriminals as well as more intricate and threatening ransomware appearing claiming it will delete files unless a payment is made.
 

Lioness1

Banned
Cloned Facebook accounts hit up friends with spam and money requests

http://nakedsecurity.sophos.com/2013/12/03/cloned-facebook-accounts-hit-up-friends-with-spam-and-money-requests/

Cloned Facebook accounts hit up friends with spam and money requests
by Lisa Vaas on December 3, 2013 | 8 Comments

Image of news desk courtesy of ShutterstockIt started in the fall, when the executive sports producer for the TV station WBAL - in the US city of Baltimore, Maryland - got a friend request on Facebook.

The request looked like it came from someone whom Chris Dachille knew, so instead of investigating who the sender really was, he went ahead and accepted.

Next thing you know, Dachille's new friend had scraped images and other information from Dachille's personal Facebook account and used it to create a profile under Dachille's name.

Using the cloned account and Dachille's friend list, the attacker then turned around and sent friend requests to Dachille's friends, many of whom accepted the overture.

As Ars Technica's Sean Gallagher reports, the attack quickly spread through the newsroom to Dachille's colleagues, with their own doppelganger Facebook accounts popping up and the attacker or attackers spamming out malicious links and using their assumed identities to request money.

It was only when Dachille's friends started to bombard him with warnings did he realize what was going on.

In an interview on WBAL, Dachille said that the idea of somebody pretending to be him and contacting his friends for money was "very troubling":

My first thought was, do they have my banking info? Do they have personal information, my [tax identification number], things like that?

Giving a stranger access to a Facebook account might not be the same as handing over our Social Security numbers, but it does give potential attackers valuable bait for phishing expeditions.

Posing as colleagues or friends, attackers can send malicious links to our friend list, as was done at WBAL. Such links could well link to malware that infects victims' computers with all manner of nastiness, including keyloggers.

In short, when we give strangers access to our Facebook accounts, it might not mean an attacker has gotten their hands on our banking information, but it certainly means that they've gotten a lot closer to it and are armed with information that's useful in carrying out phishing expeditions.

The media professionals used the "report abuse" button to alert Facebook, but it took weeks for the company to respond and take down the cloned accounts.

In fact, it took the involvement of the Maryland Attorney General, whom the station wound up contacting.

As Ars Technica's Gallagher points out, in Facebook's defense, it's difficult for the service to tell the difference between a fake account and a real one:

Many legitimate accounts share a name with another user, and the level of detail in their accounts made these clones seem genuine. [One of the reporters] told me that the duplicate account had even filled in a birthday that was close to the date of her own - information she hadn't provided in her original profile.

The victimized newsroom staffers were all using their personal accounts for both work and personal purposes, Gallagher said. The attackers not only scraped photos from the users' accounts, they also used lookalike email addresses, and, in some cases, used other personal data they obtained by getting the target to friend them.

Then they sent out friend requests to all the target's friends and repeated the process, launching spam news feed content from each of the cloned accounts.

What can a normal Joe do to claim their digital identities on, or within, social networks? Gallagher notes that Facebook offers a verified identity service for pages that are created to enable businesses and public figures to separate their personal and business personas.

Twitter, for its part, offers a blue "verified" checkmark badge to establish authenticity, but it's not open to everybody: mostly, the service concentrates on select users, such as celebrities, musicians or brands.

When someone receives a friend request, Facebook systems are designed to check whether the recipient already has a friend with the same name, along with other factors.

When people report impersonators using Facebook's built-in reporting flows, its teams review each one and take the appropriate action - including setting checkpoints (requiring additional information to proceed) or shutting down profiles if necessary.

Gallagher mentioned not being able to get to the phishy content in time to check whether it led to malware. That's actually a good sign: it means that Facebook's squashing this stuff fast when such issues arise.

That's not much consolation to WBAL, which was plagued with the attack for weeks before the clones were taken down, but again, verification is a tricky business.

Gallagher proposes that the best defense might well be to connect with others personally to ask, Is that really you? Or, alternatively to say, Yes, this is really me.

How do you prove you're you, though? Do you hand over personal data? That seems to defeat the purpose.

And how do you assume that when you're vetting a friend request, the respondent isn't an attacker who's feeding you personal information he scraped off of heaven knows where?

Your thoughts are welcome in the comments section below.

In the meantime, Facebook told me that it's aware of these reports and has developed several techniques to help detect and block this particular form of abuse.

Facebook encourages people to:

Vet all friend requests;
Beware of suspicious emails with misspellings, typos, multiple fonts or oddly placed accents; and
Report suspected phishing messages using the appropriate links placed throughout the service.

Facebook has more help on phishing in its Help Center.

And if you'd like to keep up to date on the latest Facebook scams and other security-related news, consider liking our Naked Security Facebook page.

Image of news desk courtesy of Shutterstock.
 

Lioness1

Banned
Facebook users hit with pishing and malware combo attack

http://www.net-security.org/malware_news.php?id=2650

Facebook users hit with phishing and malware combo attack
Posted on 12.12.2013

An interesting phishing / malware delivery campaign has been spotted targeting Facebook users.

It all starts with a message from a Facebook friend, claiming that the user or one of his relatives or friends has had his car stolen. The user is asking for help: "Do you know / recognize the thieves? Here are the pics [TUMBLR LINK REMOVED]."

But what the target does not know is that the message does not come from the friend - his / her account has been compromised and used to spread the malicious message and increase the chance that other users will follow the offered link (apparently different for each recipient).

"Once the user clicks on the link to the Tumblr page, they are immediately redirected to a very plausible Facebook phishing page, asking the user to log in," warns SANS ISC CTO Johannes Ullrich.

The site also asks the potential victim to enter their "secret question," and then it tries to run a java applet (possibly an exploit) before finally redirecting the victim to a spoofed Youtube page and urging him to download and install an update for "Youtube Player."

Predictably, the file offered for download is malicious - a Trojan downloader that is currently detected by less than one fourth of the AV solutions used by VirusTotal.
 

Sphinx

Administrator
Staff member
https://www.huffingtonpost.com/entry/want-to-delete-your-facebook-account_us_5aafee8ae4b00549ac7df36f

What You Need To Know About Deleting Your Facebook Account


It’s harder than you think.
By Ann Brenoff

Breaking up with Facebook is hard to do. The ubiquitous social media giant apparently doesn’t take user rejection lightly, and despite its string of bad behavior, it isn’t about to let you ― or your personal data ― go without a struggle.

The latest accusation that Facebook misbehaved came over the weekend, when U.S. and British lawmakers demanded to know why the site didn’t warn 50 million of its users that a political data firm with links to President Donald Trump’s 2016 campaign had harvested their private information for something called a “psychographic voter model.”

Facebook has previously been accused of breaching the trust of its users: It allowed itself to be used as a tool for disinformation and admitted to running fake political ads designed to mislead voters.

Even aside from fears that data could wind up in the wrong places, some users have just reached their saturation point for cat videos and lunch photos. They would like to bid adieu, but Facebook makes it hard. So what’s a Facebook user to do if they’ve had enough?

Facebook likes to hang on to its users, says Serge Egelman, research director of the Berkeley Laboratory for Usable and Experimental Security, a company affiliated with the University of California, Berkeley, that researches how people make privacy and security decisions, and then uses that understanding to construct safer systems and interfaces.

The real business of Facebook is collecting data, Egelman says, and for years now, the site has made it hard for users to delete theirs ― not that the internet allows erasures anyway. Once you post something, it is out there, somewhere, forever more. Until 2007, Facebook never completely deleted a user’s information even if their account was deleted. It was more like suspending an account, which meant a person could get their account and all the information back anytime they decided to join Facebook again. In 2008, Facebook began offering the option of permanent deletion.

Today, Facebook basically offers its users two divorce options: deactivation, which leaves room for a user to come back with all their data intact (and makes that data available to Facebook even if the user doesn’t return); and deletion, which permanently removes a user’s data from Facebook but requires that the user contact Facebook and engage in a multi-step and time-consuming process for that to happen. After jumping through multiple online hoops, those wishing to delete their account must wait about two weeks for the deletion to be processed. If you sign on to an account during this waiting period, the deletion process will be terminated and you have to start all over again.


There is a third option, of course, which is to just do nothing ― you abandon your account and stop signing on to Facebook ― which Egelman and others think happens quite a bit.

Facebook did not respond to HuffPost’s request for statistics about how many users have deleted, deactivated or abandoned their Facebook accounts.

Egelman said that the “right to be forgotten” exists in the European Union, but not in the United States. “The U.S. needs more stringent policy directives so that we have the right to be forgotten and have our data delivered,” he told HuffPost.

But to keep things in perspective, he said, you should determine your “threat model,” meaning what you’re actually worried will happen.

Is it that some stranger will be able to learn where you live and what your kids’ names are from Facebook? Certainly there is the risk that collecting information from multiple online sources ― Facebook being just one ― could lead to a bigger compilation of information about you, your health conditions, your finances, etc.

The reality is that most of this data is being collected by companies that want to target the ads they send your way. While it’s annoying to think someone is tracking you, the goal is nothing more nefarious than identifying consumers for a product. Period. Which is not to discount those who would steal your identity, clean out your savings account or break into your house after learning you are in Hawaii from those vacation photos you posted on Facebook.

Facebook knows a lot about you for sure, said Egelman, but keep something else in mind: Facebook isn’t interested in giving away your data when it can make money off it. Here’s Facebook’s policy about what it will and will not do with your information.

Short of deleting your account, what can an individual user do to limit where your Facebook data winds up? Here are a few cautions:

1. Don’t use Facebook to sign on to other apps.
Sure, it’s more convenient to use Facebook to sign on to other apps, because who can remember a gazillion passwords for all those different sites? But when you do it, you are giving the other app permission to access your information on Facebook. And who knows what they, as third-party sites, will do with it?

2. Remember that the weakest link is anyone connected to you.
OK, so let’s say you have wisely heeded the advice to only friend people on Facebook who you actually know in real life. You can even make it more selective: just family for family news or just school friends for school news.

When you open the Facebook door to strangers, you are handing over the keys to your data. Ditto for posting your updates so that they can be seen by friends of friends or the public.
People frequently add their work colleagues to their friends list. This can get dicey should you complain about someone in the office or add an inappropriate photo. Maybe “Don’t Facebook Under the Influence” should be a bumper sticker?

3. Don’t let others post to your timeline.
Do you really want the lout from your college fraternity to be sharing remembrances, like the time you both woke up in the trash dumpster? “Good times, man, good times.” Your prospective employer may not agree.

College admissions officers, future employers, even future spouses ― are all going to check you out online. At least control the narrative of your own timeline and keep frat boys and others who could unwittingly harm you away.

In the same vein, your health history probably doesn’t need to be posted publicly.

4. Share defensively.
Even the most innocuous post can play into the hands of identity thieves. You know how much you love getting all those happy birthday wishes on Facebook? Get over it. Your birthdate is a vital link in the verification of your identity. Facebook’s feature of remembering your birthday and notifying all your friends is sweet ― and dangerous.

There is also really no reason to post to Facebook with the location tagger working. Facebook places lets your friends know where you are and what you are doing. What’s more, you will be spammed by others’ updates on their whereabouts, which can be very disturbing. So if you want to have your coffee in peace, make sure that your Facebook privacy settings are as per your requirements.

5. Like less, worry more.

We all get a ton of requests to like something on Facebook ― a group, a post, a movie, book or place. Tons of them. Those likes are what help shape our data profile.

Be mindful of what you say on all social media sites, including Facebook. Enjoy the site for what it gives us ― the ability to stay in touch and share life’s moments with people we know ― but watch what you post carefully.
 

Sphinx

Administrator
Staff member
https://www.huffingtonpost.com/entry/cambridge-analytica-under-cover-interviews_us_5aafebc3e4b0697dfe19352b

Cambridge Analytica Execs Bragged Of Using Fake News, Sex To Sway Elections


The admissions were recorded during a probe into the firm, which was hired by President Trump’s 2016 campaign.
By Nina Golgowski

Disturbing undercover interviews with executives from U.K.-based political research firm Cambridge Analytica have revealed admissions of bribery, entrapment and the use of sex workers to sway political elections around the world, according to an investigative series airing Monday.

The results of a monthslong investigation by Britain’s Channel 4 News revealed Cambridge Analytica’s inner workings as told by Alexander Nix, the company’s chief executive, and Mark Turnbull, the managing director of CA Political Global, to a reporter posing as a client.

The interviews are part of Channel 4 News’ “Data, Democracy and Dirty Tricks” investigation series.

During phone calls and in-person meetings at a London hotel from November 2017 to January 2018, Nix was recorded bragging that his firm and parent company Strategic Communications Laboratories (SCL) secretly influenced more than 200 elections around the world, including those in Nigeria, Kenya, the Czech Republic, India and Argentina.

Cambridge Analytica was also hired by President Donald Trump’s 2016 campaign. The firm recently made news for using data acquired by Facebook to build “psychographic profiles” about voters without their knowledge.

According to Channel 4′s meetings with Nix, his firm’s methods for influencing an election included putting certain politicians in compromising positions and secretly recording them, as well as conducting their work using fake IDs, websites, and under different company names so that the company’s relationship with the client is not publicly known.

“We do incognito very well indeed,” Nix said according to one December interview cited by Channel 4.

The company’s chief data officer, Dr. Alex Tayler, is also listed as having attended two of the meetings with the Channel 4 reporter.

During another interview in January, Nix reportedly said that one method of finding dirt on a candidate was to essentially create it.

“We’ll have a wealthy developer come in, somebody posing as a wealthy developer,” he said. “They will offer a large amount of money to the candidate, to finance his campaign in exchange for land, for instance. We’ll have the whole thing recorded on cameras, we’ll blank out the face of our guy and we post it on the internet.”

In another example, the CEO reportedly said the firm will “send some girls,” specifically Ukranian women, to a candidate’s house to seduce the individual, an act that Nix said “works very well.”
“I’m just giving you examples of what can be done and what, what has been done,” he told the reporter.

Other methods involved making the public believe inaccurate facts about a certain candidate.

“I mean, it sounds a dreadful thing to say, but these are things that don’t necessarily need to be true, as long as they’re believed,” he said.

“It’s no good fighting an election campaign on the facts,” Turnbull is reported as saying in November, “because actually it’s all about emotion, it’s all about emotion.”

Channel 4 noted that though Turnbull witnessed Nix’s comments on the use of sex workers, during a Dec. 19 interview, Turnbull said his company isn’t “in the business of entrapment” and “lying, making stuff up.”

“We wouldn’t send a pretty girl out to seduce a politician and then film them in their bedroom and then release the film. There are companies that do this, but to me, that crosses a line…” Turnbull is reported as saying.

A Cambridge Analytica spokesman, cited by Channel 4, denied reports that its firm and affiliates “use entrapment, bribes, or so-called ‘honey-traps’ for any purpose whatsoever ... ”

The firm, in a statement to HuffPost, accused Channel 4 of editing the recorded conversations in a way that would deliberately make them appear unethical.

Nix, in his own response, admitted to discussing controversial practices with the undercover reporter but said he did so only to humor what he thought was a prospective client.

“In playing along with this line of conversation, and partly to spare our ‘client’ from embarrassment, we entertained a series of ludicrous hypothetical scenarios. I am aware how this looks, but it is simply not the case,” Nix stated.

View Part 1 of Channel 4′s “Data, Democracy and Dirty Tricks” series.
 

De Master Yoda

Emeritus
Facebook is going to be investigated in a lot of places.
I agree it looks like Facebook has grown so big that they think they can do anything and not be held accountable. They will only change when their massive income starts to go down and this latest issue may just do that.
 

toper01

Moderator
Staff member
This is nothing new,it's just that the info has been onsold for other uses,and FB seem to have ignored a breach of terms,which is normal for them.Anyone who uses FB and uses an app needs to seriously look at the terms.Most apps want access to all your personal info,and your friends info too.Some want permission to post on friends timelines in your name as well.Like a lot of contracts,hardly anyone reads the terms and just click 'I accept'.Idiots.Wizards First Rule applies .
 
Top