Connect with us

Communication

Facebook Sides With Identity Thieves

Published

on

Open teaching is the idea that people have the right to learn regardless of their ability or circumstance. The diversity of the people they interact with makes for a much larger attack surface, with a huge range of connections on Facebook and elsewhere. But here we’ll focus on Facebook and some recent incidences.

// -- Discuss and ask questions in our community on Workplace.

Readers may not be aware, but Facebook has a rigorous process for dealing with the authenticity of account usage. If your account is hacked, there are ways to get it back regardless if you remember your password or the hacker continually manages to get back in. Facebook grants itself wide latitude in these matters, which could be wise in that they’ll never be sure how the next breach might arrive.

In the case of open teachers, who build trust with the people they’re teaching and often become very important in the narrative of their lives, such a process could prove vital if an attacker decided to use the trust built between teacher and student for financial gain. A fake donation campaign for a fake illness, or a request that bill payments be sent somewhere new. Two well-known open teachers, Alan Levine and Alec Couros, were compromised in just such a way.

In the case of Couros, somewhat an open teacher celebrity, his photos were used in numerous scams outside of Facebook for years. The typical Catfish-for-gain scenarios were conducted by lonely women all over the world. But then it took a much creepier twist: both Alan and Alec have been kicked off Facebook for supposedly using other people’s photos of themselves. Despite going through the process of submitting their identification more than once, the legitimate owners of the images are not allowed on Facebook at present because the scammers are using their photographs.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

The irony here is that Facebook has the ability to identify your face in many cases, even when you’re not looking at the camera lens. The company is able to identify people who may not even have Facebook accounts. Anyone who’s ever had a photo of them on Facebook, inadvertently even, in a friend’s album, gets a “shadow profile” created for them. Over time, other sightings of this face are added to the profile, and gradually it becomes clearer who each face belongs to. Nevertheless, in the case of these two open teachers, Facebook has chosen to side with the scammers, considering their accounts to be the legitimate ones.

In the future it seems there will be no hiding from the Internet. Future generations will not remember a time when there were people whose photos you couldn’t find by typing their name into a little box on a screen. For better or worse.

Featured image from Denys Prykhodov / Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

5 stars on average, based on 1 rated postsP. H. Madore has covered the cryptocurrency beat over the course of hundreds of articles for Hacked's sister site, CryptoCoinsNews, as well as some of her competitors. He is a major contributing developer to the Woodcoin project, and has made technical contributions on a number of other cryptocurrency projects. In spare time, he recently began a more personalized, weekly newsletter at http://ico.phm.link




Feedback or Requests?

3 Comments

3 Comments

  1. Alan Levine

    November 13, 2015 at 7:44 pm

    Thanks for spreading the news on this. To clarify, we were not kicked off of facebook for using other people’s photos, the scammers took revenge on our being public by reporting our profiles as “impersonating someone else” through the Facebook process (which has many flaws).

    They ask for emailed scans of “government-issued IDs” with promises they will destroy them. Ha.

    Alec did get his account restored when it happened to him; after 7 days, and submitting thee IDs twice, the second time a photo of me holding said ID (I blur out my passport number and drivers license number) — I have not heard anything.

    While people call this “identity theft” our IDs are not stolen, people can still search our names, reverse image search the photos and find out who we are via our blogs, online presences. We are not the victims as much as the people who are scammed into sending money.

    One round of dealing with someone called “Timothy Boostrom” is detailed at
    https://medium.com/cogdog/timothy-boostrom-is-not-real-28a2f57c37f4

    While my account has been in limbo for 7 days, “Timothy” was able to post a new one within 3 hours of me having gotten his other one removed.

    • P. H. Madore

      November 18, 2015 at 4:51 pm

      I will get this story updated very soon. Thanks for clarifying.

  2. Reena

    November 18, 2015 at 9:37 am

    my account was hacked ..then i how can find the hacker

You must be logged in to post a comment Login

Leave a Reply

Communication

San Bernadino iPhone Case: Major Press Agencies Are Suing the FBI

Published

on

The Associated Press, Gannett, and VICE Media are suing the FBI to know more details about the agency’s hack of the San Bernadino killer’s iPhone.

// -- Discuss and ask questions in our community on Workplace.

(more…)

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

5 stars on average, based on 1 rated postsP. H. Madore has covered the cryptocurrency beat over the course of hundreds of articles for Hacked's sister site, CryptoCoinsNews, as well as some of her competitors. He is a major contributing developer to the Woodcoin project, and has made technical contributions on a number of other cryptocurrency projects. In spare time, he recently began a more personalized, weekly newsletter at http://ico.phm.link




Feedback or Requests?

Continue Reading

Communication

Toward Unbreakable Quantum Encryption for Everyone

Published

on

Hacked recently covered the efforts of the Chinese government to build unbreakable quantum communication networks. According to analysts, quantum communications networks are so expensive that they could have a “recentralizing effect,” enabling states to recover the ground that they have lost to decentralizing digital technologies. But what if ultra-secure quantum cryptography could be made available to everyone at low cost?

// -- Discuss and ask questions in our community on Workplace.

(more…)

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Giulio Prisco is a freelance writer specialized in science, technology, business and future studies.




Feedback or Requests?

Continue Reading

Communication

The Chinese Quantum Satellite QUESS: Toward Unbreakable Quantum Networks

Published

on

One year ago Hacked covered the race between the US and China to develop “military super-powers” by harnessing quantum science, and noted that Chinese scientists were developing quantum communication satellites that support unbreakable encryption. A few weeks ago, China launched its first quantum satellite.

// -- Discuss and ask questions in our community on Workplace.

(more…)

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Giulio Prisco is a freelance writer specialized in science, technology, business and future studies.




Feedback or Requests?

Continue Reading

Recent Comments

Recent Posts

A part of CCN

Hacked.com is Neutral and Unbiased

Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com.

Trending