Las Vegas Murders: Fake News Follows Every Tragedy

A gunman on the 32nd floor of the Mandalay Bay Resort and Casino in Las Vegas fired ammunition into a large crowd at a music concert adjacent to the hotel. At least 58 people were killed and more than 500 were wounded. 

The gunman, 64-year-old Stephen Paddock, was found dead when law enforcement entered his hotel room. That sums up most of what is known. Any information beyond that? Be very, very careful before you believe it. It’s an unfortunate reality that every tragedy breeds not just misunderstandings but outright conspiracies and lies. 

This has always been true, a collision of imperfect information and the impulse to rationalize, to make the previously unthinkable square with what we thought we knew about the world.

You could see it in the aftermath of the Boston Marathon bombing, when Reddit wrongly identified college student Sunil Tripathi as one of the attackers. You could see it during and after Hurricane Sandy upended New York, when Photoshopped images of sharks and a doctored shot of a scuba diver underwater in the Times Square subway station consumed Twitter.
And you can see it unfolding now, just hours after the Las Vegas shooting. Paddock has already been claimed by and assigned to any number of fringe or terrorist groups. 

Message boards like 4chan have already claimed that the Instagram account of an unrelated Stephen Paddock belongs to the shooter. Trolls have coalesced around the notion that the real shooter was another man altogether, a theory that was briefly lent legitimacy when it got a write-up in the conservative-leaning site Gateway Pundit. 

That’s just a sampling. Misinformation has also swirled about Marilou Danley, an initial person of interest who turned out to be out of the country. 

And as happened in the wake of the Manchester bombing this past May, a number of Twitter accounts are circulating photos of missing “victims” who turn out to be YouTube celebrities, porn stars, and stock-photography models.

Some of these misunderstandings are benign; others are malicious. All meet the same counterproductive ends. The most alarming seek to fit Paddock into a preexisting narrative. The so-called "alt-right" on Twitter has advanced the theory that he was a member of the “antifa,” a group dedicated to fighting perceived acts of fascism. 

Going in the opposite direction, terrorist group ISIS claimed responsibility for the Las Vegas attack, stating that Paddock “converted to Islam a few months ago.” Meanwhile, authorities have said they’ve seen no evidence that ties Paddock to an international terrorist organisation.

At some point they may. There may be a thread that clearly explains Stephen Paddock, that brings a blurred horror into focus. They also may not. All that matters, though, is that they haven’t yet. And anyone who claims otherwise—about his motivations, or allegiances, or what specific gun he used, or any of a thousand currently unknown variables—is only making things worse. It feels pat at this point to note that social media exacerbates these problems. That doesn’t make it any less true. And not calling it out when it happens, becoming inured to it, only gets us further away from a ground truth when we need it most.

It's worth noting, too, that Facebook and Google, already under fire for platforms run amok, both enabled misinformation in small bursts Monday. In its page dedicated to information about the Las Vegas shooting, Facebook included a link both to the incorrect Gateway Pundit story and to an alt-right blogspot page. 

Google, meanwhile, included a 4chan post in a search related to the shooting. The company says the search result was deleted "within hours."

Algorithms almost certainly surfaced all of these erroneous results, but the companies that created and maintain those algorithms bear the blame, especially when they place outlandish misinformation on even footing with reputable reporting.

Wired:

You Might Also Read:

Twitter May Introduce A 'Fake News' Flag:

Facebook To Introduce Fake News Tools:

Google’s Fact Checking News:

 

« Three Ways The IoT Can Drive Business Value
Government Cyber War Games »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

Cork

Cork

Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage.

8kSec

8kSec

8kSec is a cybersecurity company specializing in training, consulting, and research.