Las Vegas Murders: Fake News Follows Every Tragedy

A gunman on the 32nd floor of the Mandalay Bay Resort and Casino in Las Vegas fired ammunition into a large crowd at a music concert adjacent to the hotel. At least 58 people were killed and more than 500 were wounded. 

The gunman, 64-year-old Stephen Paddock, was found dead when law enforcement entered his hotel room. That sums up most of what is known. Any information beyond that? Be very, very careful before you believe it. It’s an unfortunate reality that every tragedy breeds not just misunderstandings but outright conspiracies and lies. 

This has always been true, a collision of imperfect information and the impulse to rationalize, to make the previously unthinkable square with what we thought we knew about the world.

You could see it in the aftermath of the Boston Marathon bombing, when Reddit wrongly identified college student Sunil Tripathi as one of the attackers. You could see it during and after Hurricane Sandy upended New York, when Photoshopped images of sharks and a doctored shot of a scuba diver underwater in the Times Square subway station consumed Twitter.
And you can see it unfolding now, just hours after the Las Vegas shooting. Paddock has already been claimed by and assigned to any number of fringe or terrorist groups. 

Message boards like 4chan have already claimed that the Instagram account of an unrelated Stephen Paddock belongs to the shooter. Trolls have coalesced around the notion that the real shooter was another man altogether, a theory that was briefly lent legitimacy when it got a write-up in the conservative-leaning site Gateway Pundit. 

That’s just a sampling. Misinformation has also swirled about Marilou Danley, an initial person of interest who turned out to be out of the country. 

And as happened in the wake of the Manchester bombing this past May, a number of Twitter accounts are circulating photos of missing “victims” who turn out to be YouTube celebrities, porn stars, and stock-photography models.

Some of these misunderstandings are benign; others are malicious. All meet the same counterproductive ends. The most alarming seek to fit Paddock into a preexisting narrative. The so-called "alt-right" on Twitter has advanced the theory that he was a member of the “antifa,” a group dedicated to fighting perceived acts of fascism. 

Going in the opposite direction, terrorist group ISIS claimed responsibility for the Las Vegas attack, stating that Paddock “converted to Islam a few months ago.” Meanwhile, authorities have said they’ve seen no evidence that ties Paddock to an international terrorist organisation.

At some point they may. There may be a thread that clearly explains Stephen Paddock, that brings a blurred horror into focus. They also may not. All that matters, though, is that they haven’t yet. And anyone who claims otherwise—about his motivations, or allegiances, or what specific gun he used, or any of a thousand currently unknown variables—is only making things worse. It feels pat at this point to note that social media exacerbates these problems. That doesn’t make it any less true. And not calling it out when it happens, becoming inured to it, only gets us further away from a ground truth when we need it most.

It's worth noting, too, that Facebook and Google, already under fire for platforms run amok, both enabled misinformation in small bursts Monday. In its page dedicated to information about the Las Vegas shooting, Facebook included a link both to the incorrect Gateway Pundit story and to an alt-right blogspot page. 

Google, meanwhile, included a 4chan post in a search related to the shooting. The company says the search result was deleted "within hours."

Algorithms almost certainly surfaced all of these erroneous results, but the companies that created and maintain those algorithms bear the blame, especially when they place outlandish misinformation on even footing with reputable reporting.

Wired:

You Might Also Read:

Twitter May Introduce A 'Fake News' Flag:

Facebook To Introduce Fake News Tools:

Google’s Fact Checking News:

 

« Three Ways The IoT Can Drive Business Value
Government Cyber War Games »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

Sequoia Capital

Sequoia Capital

Sequoia Capital is a venture capital firm focused mainly on technology. We partner both with young companies finding their stride and established ones looking for growth.

Elron Ventures

Elron Ventures

Elron partner with early stage ventures to build companies that transform lives and industries. Our main areas of focus are enterprise software, cybersecurity, and healthcare.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

Senteon

Senteon

Senteon is a turnkey cybersecurity platform designed to make securing confidential data affordable, understandable, and streamlined for small-to-mid sized businesses and MSPs.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.