Las Vegas Murders: Fake News Follows Every Tragedy

A gunman on the 32nd floor of the Mandalay Bay Resort and Casino in Las Vegas fired ammunition into a large crowd at a music concert adjacent to the hotel. At least 58 people were killed and more than 500 were wounded. 

The gunman, 64-year-old Stephen Paddock, was found dead when law enforcement entered his hotel room. That sums up most of what is known. Any information beyond that? Be very, very careful before you believe it. It’s an unfortunate reality that every tragedy breeds not just misunderstandings but outright conspiracies and lies. 

This has always been true, a collision of imperfect information and the impulse to rationalize, to make the previously unthinkable square with what we thought we knew about the world.

You could see it in the aftermath of the Boston Marathon bombing, when Reddit wrongly identified college student Sunil Tripathi as one of the attackers. You could see it during and after Hurricane Sandy upended New York, when Photoshopped images of sharks and a doctored shot of a scuba diver underwater in the Times Square subway station consumed Twitter.
And you can see it unfolding now, just hours after the Las Vegas shooting. Paddock has already been claimed by and assigned to any number of fringe or terrorist groups. 

Message boards like 4chan have already claimed that the Instagram account of an unrelated Stephen Paddock belongs to the shooter. Trolls have coalesced around the notion that the real shooter was another man altogether, a theory that was briefly lent legitimacy when it got a write-up in the conservative-leaning site Gateway Pundit. 

That’s just a sampling. Misinformation has also swirled about Marilou Danley, an initial person of interest who turned out to be out of the country. 

And as happened in the wake of the Manchester bombing this past May, a number of Twitter accounts are circulating photos of missing “victims” who turn out to be YouTube celebrities, porn stars, and stock-photography models.

Some of these misunderstandings are benign; others are malicious. All meet the same counterproductive ends. The most alarming seek to fit Paddock into a preexisting narrative. The so-called "alt-right" on Twitter has advanced the theory that he was a member of the “antifa,” a group dedicated to fighting perceived acts of fascism. 

Going in the opposite direction, terrorist group ISIS claimed responsibility for the Las Vegas attack, stating that Paddock “converted to Islam a few months ago.” Meanwhile, authorities have said they’ve seen no evidence that ties Paddock to an international terrorist organisation.

At some point they may. There may be a thread that clearly explains Stephen Paddock, that brings a blurred horror into focus. They also may not. All that matters, though, is that they haven’t yet. And anyone who claims otherwise—about his motivations, or allegiances, or what specific gun he used, or any of a thousand currently unknown variables—is only making things worse. It feels pat at this point to note that social media exacerbates these problems. That doesn’t make it any less true. And not calling it out when it happens, becoming inured to it, only gets us further away from a ground truth when we need it most.

It's worth noting, too, that Facebook and Google, already under fire for platforms run amok, both enabled misinformation in small bursts Monday. In its page dedicated to information about the Las Vegas shooting, Facebook included a link both to the incorrect Gateway Pundit story and to an alt-right blogspot page. 

Google, meanwhile, included a 4chan post in a search related to the shooting. The company says the search result was deleted "within hours."

Algorithms almost certainly surfaced all of these erroneous results, but the companies that created and maintain those algorithms bear the blame, especially when they place outlandish misinformation on even footing with reputable reporting.

Wired:

You Might Also Read:

Twitter May Introduce A 'Fake News' Flag:

Facebook To Introduce Fake News Tools:

Google’s Fact Checking News:

 

« Three Ways The IoT Can Drive Business Value
Government Cyber War Games »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

R3

R3

R3 is an enterprise blockchain software firm working with a broad ecosystem of more than 300 participants across multiple industries to develop blockchain applications.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

Oxygen Technologies

Oxygen Technologies

Oxygen Technologies is a business systems strategy and integration company offering a variety of solutions to give our clients ways to work smarter not harder.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.