Everyone must protect social media accounts

| March 9, 2015 | 0 Comments
Twitter

Twitter

CID Lookout, Criminal Investigation Command

QUANTICO, Virginia — In January 2015, the Twitter and YouTube accounts of U.S. Central Command (CENTCOM) were hacked and defaced.

In February 2015, a Twitter account dedicated to military spouses was hacked and defaced, and “Newsweek’s” Twitter account was also commandeered.

In each case, alleged, violent extremist groups spewed threats and anti-U.S. rhetoric.

Spreading propaganda is hardly a new tactic. However, hijacking personal, corporate and government social media is a more recent phenomenon and demonstrates a level of technological adaptability and competence.

The greater Army community can take steps to protect itself and its online presence.

“Social networking sites empower people to connect and organize with others based on common interests, background and associations,” said Daniel Andrews, director of the Computer Crime Investigative Unit. “Indeed, these technologies have impacted modern society and are interwoven in daily activities.

“Unsurprisingly, criminal elements and adversaries also harness the power of social networking sites to conduct surveillance and otherwise further their causes,” he continued. “Our goal is to help users understand online risks and make informed decisions to mitigate those risks, ultimately leading to safer online activities.”

As a result of recent world events and a continual effort to protect the force, special agents with the U.S. Army Criminal Investigation Command’s Computer Crime Investigative Unit (CCIU) strongly recommend that anyone affiliated with the U.S. military, review their social media accounts to make sure they are using the best security settings to protect their online profiles.

Facebook logo

Facebook logo

With that in mind, CID provides the following information to help the greater Army community protect itself online and significantly reduce the chance of becoming a victim of cybercrime.

Recommendations

•Do not accept friend/follower requests from anyone you do not know. Independently verify identities.

•Securely configure your social networking accounts to minimize who can see your information.

•Be cautious when accessing online accounts from public Wi-Fi connections. Someone might have installed software capable of capturing your login credentials and other sensitive information.

•Do not use the same password for all of your accounts.

•Use strong, unique passwords. Consider pass phrases for an additional level of safety.

Tips to avoid being socially engineered via phishing emails

•Be suspicious of unsolicited email messages from individuals and companies. If an individual claims to be from a legitimate organization, try to verify the identity with that organization.

•Do not use contact information provided in the email or on a website connected to the request.

•Do not respond to email solicitations.

•Do not follow links sent in email solicitations.

•Do not provide personal, financial or account (username and password) information to email solicitations.

•Pay attention to the URL of a website in email solicitations. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain.

•Employ the use of a spam filter.

•Treat all email attachments with caution. Turn off the option to automatically download attachments.

CID

CID

More Online

Learn more by reviewing these pdfs:

www.cid.army.mil/documents/CCIU/2can/SocialNetworkingSafetyTips.pdf.

www.cid.army.mil/documents/CCIU/2can/CCPFFacebook.pdf.

www.cid.army.mil/documents/CCIU/2can/CPFFTwitter.pdf.

www.cid.army.mil/documents/CCIU/2can/CPF%200020-10(home%20computer%20security).pdf.

www.cid.army.mil/documents/CCIU/2can/2CAN%200023-07%20(Cyber%20OPSEC).pdf.

For more information on CID or to report a felony-level crime or provide information concerning a crime, contact your local CID Office, the Military Police or visit www.cid.army.mil.

Tags: , , , , , ,

Category: Education, News, Safety

Leave a Reply

Your email address will not be published. Required fields are marked *