Las Vegas Murders: Fake News Follows Every Tragedy

A gunman on the 32nd floor of the Mandalay Bay Resort and Casino in Las Vegas fired ammunition into a large crowd at a music concert adjacent to the hotel. At least 58 people were killed and more than 500 were wounded. 

The gunman, 64-year-old Stephen Paddock, was found dead when law enforcement entered his hotel room. That sums up most of what is known. Any information beyond that? Be very, very careful before you believe it. It’s an unfortunate reality that every tragedy breeds not just misunderstandings but outright conspiracies and lies. 

This has always been true, a collision of imperfect information and the impulse to rationalize, to make the previously unthinkable square with what we thought we knew about the world.

You could see it in the aftermath of the Boston Marathon bombing, when Reddit wrongly identified college student Sunil Tripathi as one of the attackers. You could see it during and after Hurricane Sandy upended New York, when Photoshopped images of sharks and a doctored shot of a scuba diver underwater in the Times Square subway station consumed Twitter.
And you can see it unfolding now, just hours after the Las Vegas shooting. Paddock has already been claimed by and assigned to any number of fringe or terrorist groups. 

Message boards like 4chan have already claimed that the Instagram account of an unrelated Stephen Paddock belongs to the shooter. Trolls have coalesced around the notion that the real shooter was another man altogether, a theory that was briefly lent legitimacy when it got a write-up in the conservative-leaning site Gateway Pundit. 

That’s just a sampling. Misinformation has also swirled about Marilou Danley, an initial person of interest who turned out to be out of the country. 

And as happened in the wake of the Manchester bombing this past May, a number of Twitter accounts are circulating photos of missing “victims” who turn out to be YouTube celebrities, porn stars, and stock-photography models.

Some of these misunderstandings are benign; others are malicious. All meet the same counterproductive ends. The most alarming seek to fit Paddock into a preexisting narrative. The so-called "alt-right" on Twitter has advanced the theory that he was a member of the “antifa,” a group dedicated to fighting perceived acts of fascism. 

Going in the opposite direction, terrorist group ISIS claimed responsibility for the Las Vegas attack, stating that Paddock “converted to Islam a few months ago.” Meanwhile, authorities have said they’ve seen no evidence that ties Paddock to an international terrorist organisation.

At some point they may. There may be a thread that clearly explains Stephen Paddock, that brings a blurred horror into focus. They also may not. All that matters, though, is that they haven’t yet. And anyone who claims otherwise—about his motivations, or allegiances, or what specific gun he used, or any of a thousand currently unknown variables—is only making things worse. It feels pat at this point to note that social media exacerbates these problems. That doesn’t make it any less true. And not calling it out when it happens, becoming inured to it, only gets us further away from a ground truth when we need it most.

It's worth noting, too, that Facebook and Google, already under fire for platforms run amok, both enabled misinformation in small bursts Monday. In its page dedicated to information about the Las Vegas shooting, Facebook included a link both to the incorrect Gateway Pundit story and to an alt-right blogspot page. 

Google, meanwhile, included a 4chan post in a search related to the shooting. The company says the search result was deleted "within hours."

Algorithms almost certainly surfaced all of these erroneous results, but the companies that created and maintain those algorithms bear the blame, especially when they place outlandish misinformation on even footing with reputable reporting.

Wired:

You Might Also Read:

Twitter May Introduce A 'Fake News' Flag:

Facebook To Introduce Fake News Tools:

Google’s Fact Checking News:

 

« Three Ways The IoT Can Drive Business Value
Government Cyber War Games »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Cyberhaven

Cyberhaven

Cyberhaven provides rapid enablement for GDPR and CCPA compliance, streamlined data security and modern risk management.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

ZARIOT

ZARIOT

ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Concorde Technology Group

Concorde Technology Group

Concorde Technology Group is one of the UK’s leading IT support and services providers, delivering cost-effective and innovative IT solutions to businesses across the country.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

Colt Technology Services

Colt Technology Services

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.

RedLattice

RedLattice

RedLattice are at the cutting edge of tool development and AI-assisted vulnerability research in cybersecurity.

Aeris

Aeris

Aeris IoT Watchtower is the world’s first fully integrated cyber security solution for cellular IoT devices.