Tweaking your victim profile

The Netflix movie – The Accused was so intensely accurate in terms of what has happened and could indeed happen again to someone being wrongfully accused via our glorious social media ecosystem.

I had to stop watching it halfway through just to analyse the touch points (spoiler alert) –

Reading classification – personal threat, injury detail, discrimination, suicide

The victim profile

Threat / eventPossible risk counter measures
High number of followers 200+Do you know all these people?
Open profile – public access to personal data, followers, posts etcLimited how unknowns can tag you
Connected family and friend’s profiles are open and contain meta data such as location details, home address etcLimited how unknowns can map your relationships
Phone location services openTurn off when no Apps not in use
Images taken by 3rd party in public revealing locationTough one to tackle as people are always snapping
CCTV data mapped with social mediaAlmost impossible to hide
Monitoring a hashtag in real timeNo real reason to do this unless you are actually going to react
Online rumour pushed as factResponse to accusations in real time by key social media channels, put out a pubic statement, engage a legal advisor.
Online threat to life reported by phoneReport online and get a crime number
Open-source intelligence (OSINT) data used to compile and share personal data on public forums anonymously.Check yourself to see what you are sharing publicly
Sometimes you just need to help yourself

Newly Identified Defendants

The arena of International Law, Digital crime and Money creates an absolute boiling pot of complex, interconnected issues that can sometimes be difficult to understand. The case of Microsoft Corporation, Plaintiff verses Defendants in a Civil Action No. 1-24-cv-2323 in Virginia USA where the plaintiff disabled the abuse of their system and then took legal action is bedtime story reading.

The defendants were truly global and included end-users of a hacked system. Defendants were named and shamed but apparently the legal counsel of the plaintiff had personal information leaked publicly (Doxing). 

So much for privacy.

No one in the case is off-limits and brings a point that privacy is a gargantuan task nowadays where even high-level operatives are vulnerable to attack and exploitation.

Every run Data classification for our personal stuff?