In early 2020, I participated in an art show at Webster University called “Back to Our Roots”. I dedicated my entry for the show to my late friend Mark Reed who passed away in 2018. At the time I was in this show, I started an artist statement to go along with my entry and I put it on one of my web sites. Like a lot of my projects, it grew bigger and more elaborate than I planned at first, and is still in progress. I ended up including grief about several other things in the process which is one of the reasons the series got bigger and bigger. It’s expanded almost to the size of a mini book, kind of like a mini memoir using my art journal and artwork as a jumping off point to write about my life so far.
My original intention in starting these pages which I’ll link to below was to help me process my grief over Mark and explain what my art journals were all about. At the “Back To Our Roots” opening I included little pieces of paper with the QR code to my web site so that show visitors could access the artist statement in progress from smartphones. The show was forced to close early, first from vandalism and then from COVID-19, so not very many people were able to see the original show.
Since I began the project, I have experienced more grief of an even more serious magnitude. It was caused by the type of trauma that when I hear about similar things happening to others I ask myself “how do people live through that”? I’m doing a lot better, thanks to therapy and a lot of writing and art making. While I’m getting better, there are people I know getting one piece of bad news after another. I just heard this morning from a friend whose family, like mine, has recently been impacted by suicide. For all those out there who hear bad news and wonder “how do people live through this”, or are wondering how they are going to cope with something in their own life, maybe my artist’s statement ongoing project will help.
If you would like to read what I’ve written so far, here is an index to all the existing “chapters” in progress. Just click the “back” and “next” graphical buttons to navigate forward or backward.
Toward the end of my recent Social Engineering class at Webster University, we were asked to speculate on our final exam and in class discussions on the future of social engineering in the face of upcoming technology trends. Here is a compilation of some of the questions followed by my answers.
“‘Question: What will social engineering look like in 10-15 years? New SE techniques to use against targets? Better AI defenses protecting from online attacks? What is going to happen going forward?’
I was looking through some magazines my brother gave me last year and found articles relevant to the topic of future security challenges. The pandemic may not have put a freeze on innovation for a full year, but it probably slowed things down. So these articles I’ve viewed are probably not too out of date. My participation in the IT industry over the years has been as a creative – so I’m not that technical. I’m summarizing the technology aspects the best I can from one article in particular – “Technology Predictions from a [Precision] Electronic Test Thinktank”.
According to Microwaves & RF magazine, these are some of the trends that will help shape the future (Alexander and Harris). As I summarize I will frame them to emphasize issues most relevant to social engineering.
5G networks will increase the power and capabilities of anything that is wireless, creating more innovation and adoption of applications.
Much new software with updated standards and certifications will be needed to run all these new applications, and users will need to be educated on what the software is capable of.
Artificial intelligence will be built into processors and chips. Quantum systems will need this capability to “control, measure and error-correct”.
Hardware will be designed to exploit the new faster speeds and processing power. Customers for the hardware are interested in providing satisfactorily speedy service to users but are even more intrested in “customer traceablility through the network for application monetization”.
More collaboration between international regulatory agencies and the technology providers will be required.
More consumers will use “Internet of Things” products and these devices will increasingly communicate with each other.
Human intervention will increasingly be removed from the loop.
Engineering education will become more holistic and interdisciplinary to bring awareness to engineers on the effects of technology on society and the environment and to aid in the developement of artificial intelligence, automation and robotics.
In my Project #2 for this class, an important part of the (proposed, hypothetical) operation is to identify individuals who are more prone to risky behavior, and exploit that tendency. I did some research on the psychology behind risky behavior to refine the ideas. I found an article by a psychologist that was very persuasive to me. One of his theories is that there are people strongly attracted to sensation seeking that sometimes can go too far and take their search for new thrills into risky territory (Zuckerman). Sensation seekers enjoy novelty and constant change among other things. Tech gadgets are a great way to appeal to the desire for novelty and change since there is something new to try seemingly every time you look. If predictions are correct that the Internet of Things will enjoy increasing adoption and power, I see this as a great vulnerability – especially since psychologically, the people seeking the most novelty and change could be the same indivduals who engage in risky behavior and therefore could be less concerned with safety breaches.
While doing research for Project #2, I uncovered an article about a hidden microphone in an IoT product being misused to harm people with verbal abuse in their home. The manufacturers and designers left the vulnerability there, and hackers exploited it (McKellop). We could be even more vulnerable if manufacturers, designers, regulatory agencies and software developers go beyond carelessness and perpetrate deliberate harm. This is not a far-fetched concern because it has already happened. Facebook experimented on its users to manipulate what they posted by causing sadness among other emotions (Booth), and Google has experimented with how to manipulate our behavior by creating anxiety and causing cortisol levels to go up in users of its products (“Brain Hacking”). These practices harm human health, mental and physical. With more devices in the home, we theoretically would be increasingly prone to failing to keep up with all the threats, and not necessarily only from humans.
There are science experiments being carried out now using fungus organisms to build networks that can carry electrical signals, like computer chips. The carrying ability is confirmed, but they are too slow to replace silicon chips – for now. Some fungi are capable of performing tasks such as foraging for food, hunting live meat, navigating mazes, warning plants in it’s network about insect hazards, controlling the behavior of invertebrate animals, moving resources around to plants in the network that need it most, inhibiting some kinds of plant growth and teaching themselves to exploit new, previously unknown food sources, such as cigarette butts. That’s not a complete list but enough to give you the idea. Networks that connect plants with fungi and with each other are known as the “Wood Wide Web”. Scientists are trying to find out if fungal networks can be used for bio-computing and if we can transfer information and directives from a computer to a fungus. Scientists are also trying to figure out if fungi are intelligent or sentient (Sheldrake).
The idea of being surrounded by devices with artificial intelligence chips in them that can communicate with each other without human input is pretty weird, but looks like it might really happen. What if they find a way to communicate with fungi or other species as well? The late author Michael Crichton could write a good thriller about this if he was still with us!
I found an article that claims that Facebook robots have demonstrated the ability to make up a language that only they understand to use between themselves, while also demonstrating the ability to social engineer each other (Griffin). I have mentioned my two European Starlings before that I live with. They have the ability to social engineer me, and I have social engineered them. Their language abilities are not unlike what the article describes about the two Facebook robots. More research needs to be done (I engage in a lot of speculation in this section), but the starlings seem to me to have language that falls in about four categories. One category is a set of sounds that are hard-wired in that all starlings share. They start gaining the ability to add to that set of sounds when they are about 4-6 months old. Another set is “conversational”. They add to their vocabulary throughout life depending on what sounds are around them, and family groups and regional groups share some of the same vocabulary. My starlings have some sounds that we use between me and them and they have some sounds they use only with each other, so I wonder if they have two “conversational” languages or just somewhat diffent vocabulary for me and for each other. They have the ability to mimic human speech to the point of occasionally forming new sentences that follow predictable real life English grammar rules, including proper use of adverbs and voice inflections at the ends of sentences that fit the meaning. In other words, they have made up new sentences by combining other phrases that were not originally a question but create a question and inflected it like a question. That got my attention! They don’t always get grammar exactly right – they have added “You’re so birdy” to the list of phrases they heard from me that they love to say – “You’re so pretty”, “You’re so sweet”, etc. They can learn from other species of birds too – while boarded with two African Grays for a few days they came home with some new phrases I never say such as “Hello Princess!”. The last language category I’m aware of is the “song”. This also includes vocabulary that is learned throughout life and some of the elements are shared by regional and family groups. But it is not conversational. It’s a performance that they rehearse and refine constantly (at least the male does) and perform over and over in the same order. It identifies them individually and appears to be used for different social purposess such as humiliating defeated enemies, claiming territory, attracting mates, and showing off status. It’s theorized that the longer and more complex the song is, the greater their status is.
The birds are good at reading my body language, and I have taught myself the best I can to read theirs. We communicate on some simple matters quite well using a combination of verbal and body language but I don’t know if they know abstract concepts or how to communicate them. They have a pretty good grasp on a lot of social concepts though. Attila has a sound that means “I acknowledge your request but I don’t feel like doing it”. The sound for “ok I’ll do it” is different. They are very trainable but strong-willed. It’s fairly easy for them to learn things but if they aren’t in a good mood they may refuse to do it. She has another sound that I know means “fill the food dishes before you go to work”. They both appropriate and invent sounds and combinations extensively. I suspect that people who are studying language in all kinds of beings, including AI, could benefit from living with starlings. Mine have shown me some possibilities of inter-species communication that I never imagined in an animal other than maybe a dolphin or gorilla. If Facebook’s bots could produce and interpret a sound-based language, it’s easy for me to imagine the possibility that starlings or other animals with similar language capabilities would be able to communicate with them rather well and in languages that humans wouldn’t necessarily know. Starling’s voices are often described as “robotic” or “electronic” anyway, and even wild starlings sometimes sound like R2D2! Birds can have moods. Will AI robots have moods? If so what happens if they are in a bad mood or hooked up to a species that can have moods?
So a frontier of artificial intelligence, technology and social engineering could very well have a biological component to it that goes beyond human biology, with humans being the builder and the initial programmer but not necessarily in control. Artificial intelligence might someday interface with other species. For example is it possible that another species besides humans could learn to program fungi? Some fungi can program ants, after all (Sheldrake). Could a fungus use a computer or another species or both as part of a network to send and receive information and directives?
‘Question 5. Bring the Science of Social Engineering together with the various techniques and aspects of social media, the Triad of Disruption, along with the many methods and processes we have learned in this course, into your summary understanding of Social Engineering in the modern world. Feel free to use examples, experiences, and thoughts on the future of this discipline.’
I suppose as every person gets older, they have to reconcile what they thought the future was going to be like long ago vs. how it really is. The role of technology in our lives has been fascinating to me since I was first old enough to be conscious of it.
I have been a big fan of Mid-Century modern design, especially architecture, since I was a teenager. One of the things that attracts me is the way the shapes and lines and forms evoke emotions of excitement and optimism. From much reading and study over the years, I believe that a pervasive belief in the culture that new technology equals human progress is what drives that spirit.
During the time of Web 1.0, the “dot com bubble” era, there were new images appearing to signify the same idea in a way that referenced the internet and computers. You could indicate that your organization was technically advanced by using certain shapes and symbols, and some of them were even recycled from the Mid-Century modern era. Many people believed that a technical revolution was going to lead to a better life. It was a very exciting time. Every day I went to my job as a web designer with the feeling that I was helping remake the world in a bold new way and more freedom and prosperity for all people would result.
I feel very disappointed, and even betrayed, by what is actually happening now, so well summarized in your (I’m referring here to a diagram made by my professor Dr. James Curtis) Triad of Disruption diagram. It seems as though the destructive ideas are spreading faster than the constructive ones. This class has taught me a lot of ways to try to slow the destruction down. That is valuable knowledge to have and I will try to teach as many people as I can.
Besides knowledge needed to prevent attacks and retain as much of our agency as possible, I think more holistic education to bring more disciplines in contact with each other might be needed to remind ourselves of what it means to be human. Because I have an art degree as my Bachelor’s, I know what it’s like to be looked down on for not being in one of the STEM fields. Are the humanities looked down on and machines elevated because of people’s attitudes toward themselves? That is something I would like to explore in the future – getting back in touch with our humanity to restore some aspects of the human spirit I believe are being neglected.”
It was emotionally difficult to research and write the above comments for class because so many futuristic trends seem horrifying. I find the trends toward collectivism and robotics dehumanizing and dystopian. I’m also in a similar state to many people trying to regain a sense of connection with other people after a period of relative pandemic-induced isolation. My husband and I did not have our work routines changed as much as most, but we struggle to feel connected sometimes. Since outdoor activities are getting back to normal more quickly than indoor ones, volunteering at community gardens and camping are a couple of coping strategies we’ve been employing lately.
In the next installment of “Bringing Back the Human Touch”, I’ll write more about antidotes for an excess of technology and dehumanization!
Alexander, Jay and Jeff Harris. “Technology Predictions from a [Precision] Electronic Test Thinktank.” Microwaves & RF, March 2020, pp. 21-24.
Q. Explain the concept of social engineering Framing. Why is it a key fundamental in a social engineering plan? Provide an example of Framing in your own context of a work or social setting.
Framing is how a Social Engineering target dynamically reacts to a situation based on life experiences and their own traits and characteristics (Hadnagy 159-160). Social Engineers use a technique called frame bridging to close the gap between the scenario a Social Engineer wants the target to respond to and personal facts about the target. A pretext is a strategy the Social Engineer has prepared to bridge the frame – in other words overcome resistance to the scenario.
Today I received the following phishing email. A screenshot of the email is below, and text with the link removed follows. The links are not live because it is a graphic, and no one should click on them if they were live.
My name is Veronica.
Your website or a website that your company hosts is infringing on a copyright-protected images owned by myself.
Take a look at this document with the links to my images you used at www.chasenfratz.com and my earlier publications to obtain the evidence of my copyrights.
Download it now and check this out for yourself:
(url probably leading to something bad was here)
I believe you have willfully infringed my rights under 17 U.S.C. Section 101 et seq. and could be liable for statutory damages as high as $150,000 as set forth in Section 504(c)(2) of the Digital Millennium Copyright Act (”DMCA”) therein.
This letter is official notification. I seek the removal of the infringing material referenced above. Please take note as a service provider, the Digital Millennium Copyright Act requires you, to remove or disable access to the infringing materials upon receipt of this notice. If you do not cease the use of the aforementioned copyrighted material a lawsuit will be commenced against you.
I have a good faith belief that use of the copyrighted materials described above as allegedly infringing is not authorized by the copyright owner, its agent, or the law.
I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
Best regards, Veronica Garcia
It’s possible that whoever sent this message, whether a person or a bot, distributed them to anyone they could get to who has a blog. Social Engineers deliberately choose words that evoke emotions in the receiver (Hadnagy 163). Clearly fear is what I’m supposed to feel while reading a message like this. There are a lot of scary-sounding legal terms and phrases thrown around, and the dollar amount of possible damages that supposedly could result if I don’t act is high.
The purpose of invoking strong emotions in a target is to get the amygdala in the brain to compel the target to act and click the link before the logical part of the brain says “wait that might be a phishing email” (Hadnagy 184-185). The basic human emotions of anger, surprise, fear, disgust, contempt, sadness or happiness are tools that Social Engineers exploit for different purposes (Hadnagy 163).
If I wasn’t sure about the authenticity of the above email, I could look up the law that has been cited and the name of the artist or designer claiming infringement to see if there is any possibility it might be real. I’m not even bothering to do that, because there are several things about my particular framing that this pretext did not succeed in bridging even that far.
I’m currently enrolled in a Social Engineering class and the kind of activity represented in this email is foremost in my mind and has been for weeks.
I’ve actually received a genuine email recently regarding trademark infringement. The allegation of trademark infringement was about an adhesive dots product I had been selling in my Etsy shop. I had used the phrase “glue dots” as a tag to help describe the product when another company claims the phrase “glue dots” as a registered trademark. In my opinion “glue dots” is way too generic a phrase to legitimately claim a trademark on, but my opinion means nothing. For one thing I’m not even an attorney. Etsy informed me that they had removed my listing for that product. Just to make sure the issue was real, I contacted the law firm mentioned in the email and the manufacturer of the product in question. The law firm did not answer my inquiry but I did confirm it actually exists and specializes in that type of law. Today’s phishing email is extra suspicious because there is no law firm mentioned. The manufacturer of the adhesive dots product responded to me and confirmed it was a real issue that they were trying to resolve. In short, I have some idea what a real email of this nature looks like and this is NOT it.
I’ve been involved with business blogging as part of my work for nearly 20 years, possibly since before the term “blogs” was even in wide use, and I have a pretty good idea about what copyright violation and fair use are. If I was actually guilty of this I would know! At least I think I would. Humility is important, because while people like us are busy working at something legitimate, malicious Social Engineers are planning new schemes instead. We can never let our guard down or assume that we know everything and will easily catch every scam.
Additional Framing Techniques
The Social Engineer who created this phishing example could have used the technique of reinforcing the frame, that is causing me to think about it and therefore strengthen it, if they had done even a little bit of OSINT (Open Source Intelligence) on me (Hadnagy 166). But it’s clear they did none, other than to use my web site url which may have been scraped by a bot.
For example the phrase “Your website or a website that your company hosts” is kind of a giveaway. I would have done a little more digging if they had said “the Fiber Arts section” or something like that indicating it might not be a generic scam email. Creating an email with a more personal and specific pretext via the knowledge gained by OSINT is called spear phishing.
Negating the frame is a way of inadvertently undermining the operation by reminding the target of what they should be suspicious about (Hadnagy 165). The phishers in this case avoided that blunder – they didn’t say anything like “Beware, this is not a scam email!”
Another way of leveraging the framing of a target is hinting at or insinuating something without directly coming out and saying it. This is called evoking the frame (Hadnagy 164). I would have known what the implied threat was if the phishers had said something like “if you don’t stop using our copyrighted material we will be forced to take serious action“. Kind of like a gangster in a movie or TV show saying “this is a nice place you got here, it would be a shame if something happened to it!“
Hadnagy, Christopher. Social Engineering: The Science of Human Hacking. John Wiley & Sons, Inc. 2018.
My final exam for Social Engineering class is due at 5 pm on Friday. When I’m answering questions, it’s useful to write as though I’m explaining the concepts to a general audience. I’m going to publish these answers on this blog as I write them, before they are turned in and graded, to keep me on track to work long enough to explain completely but not so long that I run out of time and skimp on the last couple of questions (that’s what happened at the midterm exam!). A lot of people have been asking me what Social Engineering is since I’ve been in this class. I do think it’s something everyone needs to know about as part of life skills so I’ll explain the best I can. Enjoy!
Q. Discuss the art and method of Influence and Manipulation.
First I’ll define the terms according to Christopher Hadnagy, author of our textbook “Social Engineering: The Science of Human Hacking”.
Social Engineering – “Social engineering is any act that influences a person to take an action that may or may not be in his or her best interests” (Hadnagy 7).
Influence – “Getting someone to want to do what you want them to do” (Hadnagy 123).
Manipulation – “Getting someone to do what you want them to do” (Hadnagy 151).
Social engineering is part art and part science, and method is where they come together (Hadnagy 157). Hadnagy brings up cooking as an example of a pursuit that combines art and science to create a satisfactory outcome. Gardening and aquatic animal keeping are a couple of my pursuits that are similar – science knowledge is needed to keep the organisms alive, and artistry helps make the environments harmonious and attractive. There are certain needs the organisms have that must be met but I have choices in what colors I can have, quantities, how I arrange the elements, how much splashing or bubbling do I want to create a soothing sound, and other aesthetic choices that affect the total presentation.
Part of the science of SE is framing and elicitation (Hadnagy 158). Framing is how someone dynamically reacts to a situation based on life experience and internal makeup (Hadnagy 159-160). Depending on the reaction you want, artistry helps to create an approach to the frame that is appropriate to achieve the objective. Social Engineers may be called on to create characters and costumes, choose words, use props, practice acting skills, storytelling and other creative enhancements. Preparation and practice are important, as is the ability to adjust to changing situations.
Elicitation is getting a target to volunteer information (Hadnagy 168). In order to cultivate the target to be open and trusting enough to share, artistry will again be used in a planned way as well as dynamically as conversation progresses. A social engineer might plan a scenario ahead of time or create one just by observing a target. Methods such as Ego Appeals, Mutual Interest, Deliberate False Statements, displays of Knowledge and the Use of Questions are methods Social Engineers can use to subtly direct the interaction (Hadnagy 168-182). There is art in how these methods are used, and also in choosing embellishments such as the above mentioned characters, costumes, props, etc.
Q. How are each applied to a social engineering plan?
Influence – Cialdini’s Six Principles of Influence are as follows (ChangingMinds.org):
“Reciprocity: Obligation to repay.” Both wanted and unwanted gifts will create an urge to reciprocate, but if we appeal to what the target really values, we will get a greater concession in return. Gifts don’t have to be material things – good feelings in the target aroused by gifts of compliments and humor are also effective (Hadnagy 125-128).
“Consistency and Commitment: Need for personal alignment.” We have a powerful drive to meet commitments because the consistency of ideals and behavior gives us a feeling confidence and strength. I’m adding my own assumption here that this may not apply to people with psychopathy and personality disorders (“Psychopathy”). You can appeal to the urge for internal consistency in other people by getting them to agree to a small request initially then a larger one later. Victimizers use your integrity and need to make your actions match your beliefs as a weapon against you. Keeping this in mind might help us to know when it’s ok to change our minds about a commitment that is no longer serving us. Consistency and commitment can also be good defenses against attacks, since that is a good protection against people looking for examples of hypocrisy as a Social Engineering weapon against us.
“Social Proof: The power of what others do.” When we are unsure about what is safe or acceptable we often look at the behavior of others as a guide (Hadnagy 149-150).
“Liking: The obligations of friendship.” Hadnagy explains different meanings of the word “like”. We tend to like people who are “like” us in some way, that we see as a member of our tribe, and we “like” people who we think like us (Hadnagy 146-148).
“Authority: We obey those in charge.” Possessing actual authority or knowledge gives a Social Engineer more confidence to act with authority, but faking it, implying it or transferring it by seeming to associate with a genuine authority will work also (Hadnagy 140-141).
“Scarcity: We want what may not be available.” We can be Social Engineered to respond to a perceived or real scarcity of goods, sale prices, time or any kind of resources (Hadnagy 134-136).
Hadnagy lists 6 principles of manipulation (Hadnagy 153):
2. “Environmental control.”
3. “Forced reevaluation.”
4. “Removal of power.”
It’s not an accident that these tactics are synonymous with types of abuse, emotional and sometimes even physical. Abusers abuse because they want the power and control it gives them (Davenport). It isn’t only individuals who might try to abuse us – organizations can do it too. I’ve written passionately and repeatedly on this subject in my class assignments, as you know, and in other writings, because of my theory that we as a culture tend to give far too much trust to institutions that have devoted vast research and resources to manipulate, and yes, abuse.
Q. What is the difference between the two?
Hadnagy’s definitions of influence and manipulation are nearly the same in terms of wording. In both cases, the social engineer wants the target to take an action that the social engineer wants. In an influence situation, the target wants to go along with the engineer (Hadnagy 151). That is a very slight difference, and Hadnagy acknowledges that not all will agree with his chosen definitions. When I first read “How to Win Friends and Influence People” by Dale Carnegie, a friend of mine didn’t want me to read it because in his words “It teaches you how to manipulate people”. My reply to him was my interpretation of a couple of the points I thought Carnegie was trying to make – the transactions and deals you make should benefit both parties, and whatever social techniques you use to get the results you want should be sincere (Winkelmann “My Opinion of…”).
I think Hadnagy is of a similar opinion. Manipulators don’t care about the feelings or well-being of the target, and the interaction will not be remembered fondly by the target (Hadnagy 151, 153). That’s detrimental to getting future business. In Hadnagy’s case, since part of his job is to educate clients, negative feelings interfere with the learning process and are to be avoided. I think he and Carnegie would agree that it is more important for both parties to come out of an interaction both feeling good about it than for the SE to “win” the transaction by getting the better of the target.
Of course many social engineers don’t mind harming the target, or they fully intend to harm the target – that’s when their actions become manipulation. For example the same male friend who was uneasy about me reading “How to Win Friends and Influence People” used manipulation on me and another woman to try to keep us from becoming friends. All three of us were part of a group that was going on a week long backpacking and camping trip. In preparation, he told me she didn’t like me and told her I didn’t like her. So for the first day of the trip we avoided each other. Due to the way the tents worked out, we were forced to share one the first night and weren’t happy about it. The next day we both had the same thought. “She’s not so bad.” We both decided to confide in each other what the male (now former) friend had told us. We had a good laugh and became best friends until she passed away in 2003. I was Maid of Honor at her wedding!
Q. Which method is more effective (give examples of circumstances/settings to be applied)?
I think it depends a lot on the circumstances. For example, if your goal is to have a productive future relationship with a target, you will take their welfare and emotions into account so that they associate you with a pleasant experience and are open to be influenced by you because they “like” you, as Cialdini teaches. If you plan to just use and discard the target when they are no longer needed, you don’t have to consider their well-being at all.
The archetype of the “snake oil salesman” is depicted in a music video I loved and watched a lot when I was a teenager, “Say Say Say” by Paul McCartney and Michael Jackson. The protagonists are con artists who travel from town to town in a wagon selling a bogus “strength potion”. They use pre-planned pretexts, such as a script and audience plants to Social Engineer the people in a town into buying a lot of the fake potion. By the time the customers realize it’s no good, the con artists are long gone and in another town sporting a different identity. When the law catches up to them, they use a distraction to evade (Giraldi). As long as they can get away quickly enough, they are not accountable and don’t have to make a good product. They only have to create the impression long enough to get the money.
Here is a personal example of when I experienced manipulation in an airport when being solicited for a donation. A man greeted me and offered me a free paperback copy of a vegetarian cookbook. I love to cook and I love vegetables so I said “sure, thanks” and took it. I was young and this was my first time encountering this particular SE situation in an airport so was not looking for it and not prepared with defenses. The man said “Aren’t you going to give a donation?” I thought a moment and gave him a dollar. He said that isn’t enough. I was not pleased about being manipulated, so I said “I think that’s pretty good for a free book. If you disagree, you can have it back and I’ll take back the dollar”. He just looked disgusted and waved me away. I was not unhappy about giving a dollar for the book, even though it’s not something I sought out. But I love recipe books, so a free book or a dollar book, either was fine with me. But I would have balked at any more than that. Neither of us was concerned about ever seeing each other again, so it was a very low stakes situation. Since he had correctly concluded he had gotten all he was ever going to get out of me, he didn’t bother to be civil one second longer than was productive.
The larger and more powerful an organization or individual is, the more they can insulate themselves from backlash caused by self-serving, fraudulent, unkind or unfair manipulations of people. For example last summer there were large corporations taking out television ads that put their brand in a good light, showing warm and positive scenes of how they were helping their employees and customers cope with the pandemic. News stories about those brands were sometimes in direct contrast to the images in the ads. Organizations can use their money and power to “buy” morality credits by performing certain good deeds and publicizing them or just artfully appearing to. In the “Say Say Say” video we see that the fictional con artists give their ill-gotten gains to an orphanage and stop to entertain the kids, so the viewers of the video will root for them (Giraldi). This tactic works in real life too.
Marketing and Public Relations are subsets of Social Engineering, according to Hadnagy’s definition. If organizations don’t even do good deeds but claim they want to someday, or are generally in favor of good things for society and they’d love it if YOU would do them, that is enough to counteract actual corporate hypocrisy in some situations (Chen 487-490, 517-518). Influential people and organizations have the money and power to buy a lot of Marketing and PR, so they are potentially not as accountable as the less powerful. For example, from years of selling art supplies online, with Amazon being one of the platforms I sold on, I’m personally acquainted with how Amazon treats people with no power and only the most infinitesimal trace of usefulness. Admittedly already skeptical about their corporate culture, I am not the only one to ponder the disconnect between Amazon’s paid feel-good ads and news stories about how workers are treated (Barrickman and Smith). In a paper I wrote last fall about Corporate Social Responsibility and Irresponsibility I speculated about the meaning behind the amounts of corporate public donations to social justice causes by Netflix, WalMart and Amazon (Winkelmann “Corporate Social Responsibility…”). Do these amounts reflect genuine commitment to the causes, a branding technique, the amount of resources available, or the amount of morality credits they feel they need to buy to compensate for their actual activities?
A malicious Social Engineer might intend to not only evade accountability, but plan to leave the target in a weakened condition as part of the strategy. Sometimes the goal is not merely profit but total defeat of the enemy.
Barrickman, Nick and Patrick Smith. “Amazon violates its own health and safety rules in COVID-19 coverup.” World Socialist Web Site, 2020, www.wsws.org/en/articles/2020/08/05/amzn-a05.html. Accessed 10 May 2021.
ChangingMinds.org. “Cialdini’s Six Principles of Influence”. Changing Works, 2002-2021, changingminds.org/. Accessed 16 March 2021.
Chen, Zhifeng, et al. “Corporate Social (Ir)Responsibility and Corporate Hypocrisy: Warmth, Motive and the Protective Value of Corporate Social Responsibility.” Business Ethics Quarterly, vol. 30, no. 4, Oct. 2020, pp. 486–524. EBSCOhost, doi:10.1017/beq.2019.50. Accessed 28 September 2020.
Davenport, Barrie. “61 Devastating Signs Of Emotional Abuse In A Relationship.” Live Bold and Bloom, 2021, liveboldandbloom.com/02/relationships/signs-of-emotional-abuse/. Accessed 11 May 2021.
Giraldi, Bob, director. “Say Say Say.” YouTube, Paul McCartney and Michael Jackson, uploaded by Giraldi Media, 1983, www.youtube.com/watch?v=aLEhh_XpJ-0. Accessed 10 May 2021.
Hadnagy, Christopher. Social Engineering: The Science of Human Hacking. John Wiley & Sons, Inc. 2018.
“Psychopathy.” Psychology Today, 2021, www.psychologytoday.com/us/basics/psychopathy. Accessed 11 May 2021.
Winkelmann, Carolyn Hasenfratz. “My Opinion of What Marketing is About”. Carolyn Hasenfratz Design. 2020. www.chasenfratz.com/wp/my-opinion-of-what-marketing-is-about/. Accessed 10 May 2021. — “Corporate Social Responsibility and Irresponsibility”. Carolyn Hasenfratz Design. 2020. www.chasenfratz.com/wp/corporate-social-responsibility/. Accessed 11 May 2021.
This is my last week of Social Engineering class at Webster University. The textbook we have been using is “Social Engineering: The Science of Human Hacking” by Christopher Hadnagy. This book is full of powerful personal ancedotes that help me understand Social Engineering better. They also resonate deeply because so many of the anecdotes are relatable to experiences from my own life.
An example of a story that really made me think is on page 260. Hadnagy tells of talking with a friend whose family had been personally affected by a common scam. The friend was angry with him for not warning him sooner and exclaimed “If you knew these things existed, why didn’t you warn your friends?”
I have had friends get angry with me and stop speaking with me for warning them about social media and other media scams and trying to explain media literacy concepts when I saw that they were being trolled. Part of good Social Engineering is to help the people you are trying to warn become more receptive to what you are trying to teach them so they can take in the information to protect themselves against harmful Social Engineering. If someone is your friend and you care about them, you want them to know these concepts. If my attempts are too clumsy and I arouse their defenses instead of concern and I fail to warn because of that, I need to do better. That’s one of the things I’m learning in this class and others. The more I learn about media and technology as I work on a Advertising and Marketing Communications Master’s degree, the more I feel the need to warn.
I’m going to be writing a LOT this week to finish the course, and some of it is going to end up on this blog immediately and farther in the future. Hadnagy advises us not to “assume that the knowledge about these attacks is just common sense”. There are techniques in Hadnagy’s book, in our class, and in lots of other course material I’m learning that is also in classic books, around for many decades, such as “How to Win Friends and Influence People” by Dale Carnegie and “The Hidden Persuaders” by Vance Packard. I have owned those books a long time and have read them several times and I still have to work to master the material in them.
As I learned on a podcast this morning, the concept and term “Social Engineering” has been around since the late 1800s. With every new technological advance that comes along, there are new skills to learn to avoid exploitation through Social Engineering combined with other types of attacks. In order to help people find information on this blog that I think everyone should know as a life skill, I’m going to apply the hashtag #whydidntyouwarnme/ to relevant past and future blog posts.
I have also started listening to a couple of excellent podcasts that are free to listen to if you want more information about the types of media and security issues I’m trying to warn about. I think every Internet user who has something to lose, whether for personal or business reasons, needs to be informed as well as possible.
The Social-Engineer Podcast – hosted by Christopher Hadnagy himself with a variety of co-hosts as they interview leaders in the Social Engineering field.
Hacking the Humans – information about “social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll on organizations around the world”.
What types of scams are you the most concerned about?
In my Social Engineering class we have been studying Russian and other foreign cyber attacks on the USA, Germany, France, Great Britain, Ukraine, and elsewhere. One of our recent assignments was to read the following reports:
“So, what should the United States do about it? Think about the political, economic, and military weapons of war (Clausewitz) and share your thoughts about how to combat the Russian SE attacks.”
“I considered Clausewitz’s lessons of war (summarized by Pietersen) to see how they could help me create a strategy that makes sense.
Just the first step, Identify, I see as a huge challenge. I’m under the impression that most people who are angry about attempted Russian interference in recent elections are angry because their preferred candidate didn’t win, not because our Constitution and the Republic are under attack and hanging by a thread. A lot of people accept the premise that unethical and illegal acts are permissible if it helps your side. They may not be informed about the seriousness of the threat, or are informed and are rooting for the Constitution and the Republic to fall. This would be a good way for intelligence to precede operations. Do enough people even want the Republic saved to make it worth the effort to fight for it? The goal will have to be changed if there aren’t enough people on board. I’m going to write the rest of this assuming that there is enough support.
The decisive point: “Save the Constitution” would be my mission statement, at least internally. I’m not sure how to frame the campaign to get the support of enough of the public for success. It used to be considered self-evident in our culture that life, liberty and the pursuit of happiness were good things, but there are a lot of people who have been conditioned and trained to deny those rights to others that they think are beneath them and sometimes even to themselves – they don’t think they deserve it.
Concentrate: This includes physical resources as well as hearts and minds. I understand that the reports we read were based on a subset of all the existing information. The tech companies didn’t give everything they had to the Senate, and we don’t know if the Senate gave all of what they had to the analysts who wrote the reports. Nevertheless, the reports do contain enough information to have some idea of what might help on the technology side.
I would like consumers to have more choices of viable communications platforms so that they freely choose the ones they feel protect their rights and reflect their values the best. That probably means breaking up monopolies and holding corporations accountable for tortious business practices or unfair competition practices such as collusion or violations of the immunity clause in Section 230 of the Communications Decency Act. As others have pointed out in our discussion, communications companies sometimes have an incentive to allow content that harms their users but helps them financially. They’d be able to get away with this less if there were more choices.
I advocate re-instating the media based consumer protections that have been removed from our body of law such as the Fairness Doctrine, the personal attack rule and the political editorial rule, and I’d like to see them extended to online publishing and social media companies as well as broadcast and print. As I’ve stated before, I think it’s a human rights abuse to restrict information from people in order to control them. Can a “Right to Information” be added to our Constitution? I don’t know but that’s how important I think it is.
I would like to see all media companies compelled to run media literacy education content as a consumer protection measure.
I advocate media literacy training as a vital life skill in all levels of education.
Devote as least as many resources to the promotion of the Constitution and Democratic self-rule as the enemies do to undermining it.
US Consumers should have the choice to purchase physical products, software, and have access to technology platforms that are manufactured in the US and accountable to US consumers.
Resources that are vital to the security of the United States, such as medical supplies and media companies, should not be owned or controlled by foreigners.
Hold all levels of government to high standards of transparency and accountability to their constituents.
Remove: I would not want to see a repeat of excesses from the past such as McCarthy-style witch hunts or loyalty tests. I believe the most rational ideas will prevail if people are allowed to hear them and exercise their constitutional rights to assembly, free speech, freedom of the press and others. I also think internment camps for re-education or any other purpose should be off the table.
Ignore: I believe it’s important not to over-react to all the distractions that will be tried.”
I don’t consider my above suggestions as complete or comprehensive, but I think they’d be a good start. I welcome comments on this blog, pro and con, I think this is a discussion we need to have, openly and rationally, because, after all, this is war.
DiResta, Renee, Kris Shaffer, Becky Ruppel, David Sullivan, Robert Matney, Ryan Fox, Jonathan Albright, Ben Johnson. “The Tactics & Tropes of the Internet Research Agency”, New Knowledge, 2019, digitalcommons.unl.edu/senatedocs/2/. Accessed 11 April 2021.
Howard, Phillip N., Bharath Ganesh, Dimitria Liotsiou, John Kelly, Camille François. “The IRA, Social Media and Political Polarization in the United States, 2012-2018”, Computational Propaganda Research Project, University of Oxford, 2019, digitalcommons.unl.edu/senatedocs/1/. Accessed 11 April 2021.
Select Committee on Intelligence, United States Senate. “Report of the Select Committee on Intelligence United States Senate on Russian Active Measures Campaigns and Interference in the 2016 U.S. Election: Volume 2: Russia’s Use of Social Media, with Additional Views”, 2019, digitalcommons.unl.edu/senatedocs/4/. Accessed 11 April 2021.
I just turned this in as an assignment for my Social Engineering class. It has not been graded yet. Enjoy!
For the last several years, it has been alleged and believed by some that President Trump would not have been elected in 2016 if the Russians had not bought ads on Facebook on behalf of fake clients. Understandably these allegations caused a lot of Facebook users to reconsider whether or not they should continue to support Facebook. In order to safely use Facebook or any social media platform, it is important to develop skills to help determine the credibility and reputation of any individual or organization.
As a Facebook user of many years duration, to help me decide the truth of the 2016 election influence claims, I sought answers to the following questions.
Are there examples of who made the allegations?
Here are a couple. Donald Trump’s opponent Hilary Clinton, named Facebook as one of the causes of her loss and declared that CEO Mark Zuckerberg should “pay a price” (Cadwalladr). It’s interesting that Mark Elias, counsel for Hilary Clinton’s campaign, helped Facebook to avoid putting disclaimers on ads back in 2011 (O’Sullivan).
In October 2020, Senator Mark Warner (D., Va.) wrote to Jack Dorsey, the CEO of Twitter, to urge Twitter to allow political ads after Twitter had banned them (Warner), even though in 2018 he had criticized Facebook for selling ads to what he identified only as “Russians” (Crookston). He also criticized YouTube for allowing radicalizing content by “Chinese, Iranian and others”. In Warner’s 2020 letter, he decries “Russians” use of ads even as he tries to persuade Twitter to accept ads. Referring to 2016, the 2020 letter states: “Russia took advantage of our openness and communications technologies, including exploiting American-bred social media platforms to spread disinformation, divide the public, and undermine our democracy.”
Has anyone attempted to refute the allegations against Facebook?
Here is the opinion of Facebook executive Andrew Bosworth. “So was Facebook responsible for Donald Trump getting elected? I think the answer is yes, but not for the reasons anyone thinks. He didn’t get elected because of Russia or misinformation or Cambridge Analytica. He got elected because he ran the single best digital ad campaign I’ve ever seen from any advertiser. Period.” (“Lord of the Rings…”). This opinion by Bosworth and subsequent opinions I attribute to him are taken from text purported to be from an internal memo that was published on the New York Times web site. I accessed what claims to be this memo on the web site TechyLawyer because the NYT article is behind a paywall and the Webster University online library doesn’t have the article. Since I’ve seen quotes from this memo on other web sites that match the TechyLawyer site, unless I come across information that the content been misrepresented, I’m accepting for now that this is what the memo actually did say.
It was reported by the Washington Free Beacon in the context of the 2018 midterm elections, that Senator Mark Warner was of the opinion that while Facebook is a concern, YouTube and Google hosted far more misinformation than Facebook and were less transparent and less cooperative than Facebook was in trying to fight the trend (Crookston). There was a video accompanying this article, formerly hosted by YouTube, which has since been taken down, I don’t know by whom. The senator’s remarks were quoted on many other web sites that I looked at so barring information to the contrary I find the reporting credible.
Did Russians in fact buy ads?
Bosworth weighs in. “Russian Interference was real but it was mostly not done through advertising. Instead, the Russians worked to exploit existing divisions in the American public for example by hosting Black Lives Matter and Blue Lives Matter protest events in the same city on the same day” (“Lord of the Rings…”).
What is meant by “Russians”? Do they mean the Russian government, Russian citizens, Russian-Americans, who exactly?
NPR reported that 3,000 Facebook ads were purchased on behalf of a Russian agency (Folkenflik). NPR did not say what kind of agency. An ad agency? A spy agency? That was not made clear. CNN referred to the ad buyers in question as a “Russian troll farm” (O’Sullivan). I kept clicking links to see what the actual identity of the “Russian troll farm”/”agency” is and ultimately came up against the New York Times paywall.
The Baltimore Sun alleges that the ads were placed by a Kremlin-influenced agency but the article includes no citation or source for Kremlin involvement (Fritze). The Politico article names the agency in question as “Internet Research Agency” and says it is Kremlin-linked but attributes no source for this information other than unnamed members of the House Intelligence Panel and provides no quotes or links to help verify (Politico Staff). The Washington Post refers to them as “Russian Operatives” without clarifying what that means (Keating, et al).
What are some examples of the fake Facebook clients?
According to NPR, the Russian ads were turned over to Congress by Facebook (Folkenflik). Names of the alleged fake organizations that I was able to find include “Black Matters”, “Native Americans United”, “LGBT United”, “Being Patriotic”, “Army of Jesus”, “United Muslims of America”, “Secured Borders”, “BM (does this stand for Black Matters, Bowel Movement, or something else?)”, “Born Liberal”, “_american.made”, “Heart of Texas” and “american.veterans”.
What was the content of the fake ads?
I think it’s interesting that Bosworth claimed in his memo that this Russian agency bought ads pitting Black Lives Matter against Blue Lives matter, but NPR reported that Russia was trying to inflame divisions between Muslims and Black Lives Matter (Folkenflik). Is it the position of NPR that Blue Lives Matter and Muslims are allies? That is unclear. It was also disclosed in the article that there is a financial relationship between NPR and Facebook.
In order to see which candidate the ads seem to favor, and to see whether the Russians desired Blue Lives Matter vs Black Lives Matter, or Muslims vs Black Lives Matter, I tried to find out what the ad content was. Despite hearing about the Russians and their ads for years, I could not recall seeing any images of the alleged ads so I did an image search and found alleged samples published by The Baltimore Sun, Politico and the Washington Post.
Here is a survey of the messages in the ads I could find: Pro Black Lives Matter Pro Native American rights Pro Bernie Sanders Anti Hillary Clinton Anti Islamaphobia Pro secure borders Pro Blue Lives Matter Anti Black Lives Matter Anti Donald Trump Pro 2nd Amendment Pro Texas secession Pro military veterans
How much was spent on fake ads?
Facebook vice president Andrew Bosworth stated that “$100,000 in ads on Facebook can be a powerful tool but it can’t buy you an American election, especially when the candidates themselves are putting up several orders of magnitude more money on the same platform (not to mention other platforms) (“Lord of the Rings…”). I’ve heard the $100,000 figure quoted on many other web sites so for now I find the amount credible.
How does the amount of money spent by the Russian fake clients compare to real clients?
As of December 31, 2016, Hilary Clinton had raised 1.4 Billion and spent 98% of it, and Donald Trump had raised 957.6 million and had spent 99% of it (“Election 2016…”).
With the above questions answered to the best of my ability, how credible do I find the claims that Russian ads by fake clients determined the results of the 2016 election?
I find myself agreeing with Bosworth that $100,000 isn’t going to buy an election when the opponent has spent nearly 1.4 billion. There would be no need to spend nearly 1.4 billion if that was the case, they would have just spent $100,000. That sounds like a better deal to me!
If you only have $100,000 to spend on ads to try to win the U.S. Presidency, I think it’s reasonable to assume your message has to be better targeted than these examples in order to be effective.
I do find accusations credible that an ad agency in Russia created fake organizations for the purpose of running fake ads to run marketing tests, and I agree that the ads are examples of trolling. Trolling has been used in ads and ad tests before. I’ve done it. I wrote about my experiment and the Elizabeth Warren campaign running such a test on Facebook in an assignment for Media and Culture class in 2019 (Winkelmann).
The subject matter of the Russian ads is bizarre and inconsistent. Their overall effect seems more like it would be confusion rather than favoring any one party or issue. Actually, if I hadn’t researched these ads and just looked at them with no background, I would probably have assumed they were part of a Dadaist or Fluxus influenced performance art project. If these are indeed the same ads everyone has been talking about, I don’t think the controversy they generated is justified.
I have this Pinterest board to help me keep track of sources. I started it when I started this degree. I’m in favor of transparency so I want people who read my articles and papers to see what sources I collected, and what I used and didn’t use. That tells you something about a piece, what was selected for use out of what was available. And if you are interested I hope you read the sources too!
In my social engineering class, I’m studying Russian social media advertising more and might write about the topic more on this blog. This week we have been assigned to read these three papers among other material:
As I read and work on my assignments, I may or may not find that some of what I wrote above is incomplete. This is a complex topic and if I run across anything I think I need to add or change, I’ll do that and make a note of it. In the meantime, I recommend that everyone read the same three papers I’m reading so you have more background on the issues. Media reporting on this topic is very poor and very confusing and seems mostly designed to obfuscate what happened instead of attempting to help people understand. Your understanding is likely to improve after reading and like me you might have a lot more questions as well. Enjoy!
Here is a version of an assignment I did for my Social Engineering class at Webster University, CSSS 5280 that I modified for the blog. The version I submitted has not been graded yet.
A couple of years ago a co-worker excitedly told me about an interesting man she met on Facebook. As she continued to add details to her story, I recognized what she was dealing with – a common romance scam that I’ve seen many times. I felt sad having to explain to her that she was being groomed for some kind of exploitation, because she seemed so excited.
I’ve been a Facebook user for a long time, since 2008. I use my personal Facebook page for marketing as well as networking. It’s the nature of a lot of work that I do that it has been useful to allow people get to know aspects of the public-facing me – I’m not the most skilled at networking in person. I have most content on my Facebook account set to the security setting “Public” and I sometimes accept friend requests from people I don’t know unless they seem threatening.
I don’t remember exactly when I started noticing this, but every once in awhile I’d get a Facebook friend request from a man who claimed to be either in the military or working overseas in a civilian field like engineering, or the oil industry, or something like that. The first few times I went ahead and accepted these types of friend requests, because I’m generally disposed to be friendly and supportive to people unless I have reason not to be. I soon started noticing some patterns. The men in the profiles were generally above average in attractiveness, but looked like real people, not models. They were often photographed in an “action” pose or setting. Often their first and last names were two of what we would usually consider first names, put together. They sounded like what a foreigner’s idea of a generic American name would sound like rather than genuine selection of random American names. They usually claimed to be originally from the US or Europe but currently doing some kind of work in the Middle East. Their Facebook profiles were generally not very well populated with friends or content, so seemed like they had a short-lived social media presence. I could tell they hadn’t looked at my profile to learn basic facts about me, but claimed to have a burning desire to be my “boyfriend”. At first I gently turned away “romantic” conversation by saying I don’t do long distance relationships and I don’t “sext”. True statements, but irrelevant when I noticed the patterns of personal disinterest in me and constant boundary pushing. I decided they were all scammers seeking money, passwords, green cards, nude photos or all of the above and stopped accepting those requests. You would think that the word would get out about these scams enough for people to avoid them but from 2015 to 2019 the amount of money lost in online romance scams rose six times, from $33 million to $201 million (“What You Need…”).
I was able to recognize that type of scam earlier than some unfortunate other victims, but that doesn’t mean I’ve never been played. I’ve known for decades to avoid online dating and long-distance “relationships”. Before I was married I only dated men that I met in real-life situations. I was looking for suitors to court me for marriage, not hookups. I knew I would need to meet their friends, family and work colleagues and observe how they dealt with a variety of life situations over a period of time to learn their character and intentions. As a result, I was not in much demand for dates and for my age I was not very experienced. Men mostly preferred easier targets. What I didn’t realize until I experienced it is that there are people who have trained themselves to groom people like me for the purpose of perpetrating a long con. I believe I was being set up by a former “boyfriend” to be financially exploited, but was able to get out before I actually handed over any money. I had some medical bills to pay from therapy that I needed to be functional again after the emotional abuse that was gradually applied to me without me noticing for awhile, and that was pretty humiliating.
Pick Up Artists, or PUAs, are people who feign romantic interest in order to get a quick sexual conquest (Kale). Pick Up Artist techniques have been around a long time, but the Internet and the popularity of books on the topic changed the culture of dating a lot, so that by the end of the first decade of the 2000s, there was a noticeable difference in dating culture (Kale). PUA techniques are emotionally abusive and are designed to break down the resistance and push the boundaries of the target for the gratification of the abuser (Kale).
Right after reading what our first assignment for this class was, I got a typical romance scam Facebook request so I accepted it for the purpose of getting a few screen shots to show an example in action.
This example is a little unusual because this scammer is not claiming to have an “American” sounding name, but otherwise it’s pretty representative. I kept the initial conversation going for a few minutes with some generic responses on my part so I could get screen shots to show how these grooming sessions usually start. If it seems predictable like it’s a formula, that’s because it is! Romance scammers and PUAs use actual playbooks and rehearse lines in increase their proficiency (Panikian). Some even pay money to attend classes and workshops (Panikian, Dixon).
Cialdini’s Six Principles of Influence are time-tested manipulation techniques (Changingminds.org) that we are studying in Social Engineering class. I’m going to compare Cialdini’s Six Principles of Influence with some Pick Up Artist tactics to find out how and why some of the PUA techniques work.
“Reciprocity: Obligation to repay.” Giving you a lot of compliments in the beginning is called “love bombing”. They can be generous in the beginning but stingy later (Bancroft 68).
“Consistency and Commitment: Need for personal alignment.” Victimizers use your integrity and need to make your actions match your beliefs as a weapon against you. PUAs take advantage of the tendency of women to have been socialized to be polite to men (Kale).
“Social Proof: The power of what others do.” PUAs play up their attractiveness to others by talking about exes, flirting with other people in front of you, etc. to make themselves seem in demand (Dixon).
“Liking: The obligations of friendship.” People are flattered when a very attractive person, who could be a fake persona, seems to like them (Paul). PUAs like to make you feel special by paying a lot of attention to you, but it could be love-bombing or distracting you from noticing what they are really like (Dixon).
“Authority: We obey those in charge.” PUAs are instructed to exude a lot of confidence (Panikian, Dixon) and think and act as if they are the actual prize (Kale).
“Scarcity: We want what may not be available.” One PUA technique is to pretend that they are getting ready to leave a social situation so you feel pressured to talk to them because they might be gone soon. Also to give you the impression that the PUA is leaving soon and you don’t think you’ll be stuck with them long so there isn’t much downside to allowing a little conversation (Dixon).
Please protect yourself out there, on or offline!
AlphaWolf & Co. “Pick Up Artist (PUA).” PUA Lingo, 2008-2021, www.pualingo.com/. Accessed 25 February 2021. — “Neg Hit/Negging (Negs).” PUA Lingo, 2008-2021, www.pualingo.com/. Accessed 25 February 2021.
Bancroft, Lundy. Why Does He Do That? Inside The Minds of Angry and Controlling Men. Berkeley Books. 2002.
ChangingMinds.org. “Cialdini’s Six Principles of Influence”. Changing Works, 2002-2021,changingminds.org/. Accessed 16 March 2021.
I turned in my final paper for Media Organization Regulations last night. It was already a lot longer than it needed to be for the assignment, but I would have kept writing more if I had more time, right or wrong!
I am not an attorney or law student. Edit 12-22-20 – I found and fixed a couple of typo-type errors in the Works Cited section.
After seeing my grade, I did ok on this paper but I didn’t do great. I want it to be great. My professor left me some comments about things she thinks I should have included. It is possible that I will publish a revised version of this paper incorporating the professor’s suggestions. When/if I do that I will have to double-check how to give proper credit for that sort of thing in an academic paper in the MLA format because I’m being trained in academic writing and academic integrity as I go as well as in course material. Before starting this degree in 2019 I hadn’t written an academic paper since 1993. What you will read below is unedited from when I submitted it except for two typos in the credits section. When/if I revise it further I’ll make that clear in the proper format.
At the end I have links to sources, and after that links to other posts on this blog that are on related topics in case you think the subject is interesting and want to read more. I’ll also link to the Pinterest board I use to help collect and organize sources I might use. Enjoy!
Carolyn Hasenfratz Winkelmann
Geri L. Dreiling, J.D.
MEDC 5350: Media Organization Regulations
20 December 2020
Can Laws Protect The Public From The Media?
Physical abuse of women in history has been mostly allowed to go on without consistent punishment until the 1990s. Hundreds of years of beliefs that abuse victims deserve it, that the perpetrators who are punished are the real victims, or that abuse victims must be lying will likely take generations to diffuse because they were validated by hundreds of years of attitudes as well as the lack of prohibitive laws. Another obstacle abuse victims have to face is a lack of enforcement even when there were applicable laws on the books (Bancroft 321).
In our culture, physical violence against domestic partners is slowly becoming less acceptable. It is not as common as it used to be for family members, neighbors, or bystanders to look the other way when they witness abuse. Some schools even teach children that they are entitled to safety from family members in their home instead of only strangers outside of it when they are teaching them how to call 911 for help (Bancroft 293).
Even though emotional and economic abuse can inflict severe harm, there are not as many legal preventive measures or remedies available for mental abuse as there are for physical violence (Bancroft 293). It is difficult to promote awareness of the seriousness of emotional abuse when physical abuse has only been taken seriously in very recent history (Bancroft 321).
Negligent infliction of emotional distress, or NIED, is a tort that can be used in a suit against someone who carelessly caused emotional harm to another person (Trager et al 184). A plaintiff hoping to win such a suit must be able to prove the following facts (Trager et al 184):
The defendant had a duty to use due care in interactions with the plaintiff.
The defendant acted negligently while failing to use due care.
The plaintiff has suffered injury.
The injury can be proven to be caused by the plaintiff’s negligent actions.
Attempts have been made to bring NIED lawsuits against the media as well as individual abusers, but they usually are not successful (Trager et al 185). It is difficult for the plaintiff to prove proximate cause, that is, a reasonable finding that the defendant’s actions were directly to blame for the plaintiff’s injury (Trager et al 184). It is theoretically much easier to prove that a media plaintiff was negligent because there are ample studies showing how media members should behave if they care about the public’s well-being, but negligence alone is not enough to win a suit (Trager et al 184-185).
If the behavior of the media defendant is so outrageous that “a civilized society” would consider it “intolerable and beyond all bounds of decency” then the potential tort might rise to the level of intentional infliction of emotional distress, or IIED (Trager et al 179). The plaintiff must still prove direct causation (Trager et al 179). In addition, if the plaintiff is a public figure, the defendant must be proven to have acted with actual malice, that is “publishing with knowledge of falsity or a reckless disregard for the truth” (Trager et al 181). Even actual malice is sometimes not actionable if the courts interpret the defendant’s actions as satire or parody, or if the subject of the offending speech is about a matter of “public concern” (Trager et al 184).
One reason the media has so much latitude is because the founders of our country considered a free press and freedom of speech to be so important that they specified those rights in the First Amendment (Baran and Davis 30). When members of the media are criticized for having harmful effects on our culture, they argue that they are not that influential, that they reflect society but don’t have the power to shape it. At the same time, the media tells advertisers they can give them a good return on their investment and if an organization is of any significant size, be it government, nonprofit, or business, they spend money and resources on maintaining a public relations department (Baran and Davis 30). A belief that media IS very influential is apparently coming from somewhere.
There has been disagreement among theorists, academics, government officials, media companies and the public about how legally free from restraint the media should be ever since there was such a thing as media (Baran and Davis 62-63). The idea of technocratic control was considered and debated in the United States but ultimately rejected, at least if it was framed as control by the government. Technocratic control is “direct regulation of the media” by technocrats, people considered to possess the correct values and skills to regulate media for the welfare of the public (Baran and Davis 62). One of the reasons government technocratic control was rejected in the United States in the 20th century was because there was no consensus on who was qualified to have that power (Baran and Davis 62-63). Regulations that applied in certain situations that passed First Amendment tests have been enacted over the years and are sometimes thrown out by the courts when re-tested. The limits are renegotiated constantly from both the direction of greater freedom and the direction of more control (Baran and Davis 63).
Part of my incentive in choosing in this paper to examine parallels between domestic abusers and media abusers is the observation that both groups have the characteristic of constantly testing limits, like predators looking for weaknesses and loopholes to see what their targets and society will let them get away with. Awareness and legislation often lag behind the latest technological developments and technocracy strategies. Another reason is that abusers and media utilize many of the same manipulative techniques. Does the media share some of the same motivations as domestic abusers? Neither group can be trusted to be forthcoming about their intentions because of course they are more effective when their tactics are opaque – one can only judge by observing patterns of behavior.
There is another parallel between domestic abuse and media behavior that could be examined from a regulatory perspective. In considering the pattern of legal intervention in abuse, physical harm was an obvious effect of abuse to be considered worthy of attention by the law. When consumer products began to be subject to regulation in the United States, the danger of physical harm to the public was also an issue addressed early on.
Consumer protection laws began to be enacted in some US states as early as the mid-1800s to protect the public from adulterated food and drugs (Pride and Ferrell 78). The federal Food and Drug Administration (FDA) was created to assume responsibility, formerly handled by the Department of Agriculture, for testing agricultural products (“The History of FDA’s…”). The 1906 Pure Food and Drugs Act was a continuation this public safety work as the regulatory body evolved into what we know as the FDA by the 1930s (“The History of FDA’s…”). There was a further push for increased legislation designed to reduce physical harm from products, their advertising, and labeling in the 1960s and 1970s (Pride and Ferrell 78). Today there are several additional federal agencies created to help protect consumers. Some of the major ones are the Federal Trade Commission (FTC), the Consumer Product Safety Commission (CPSC), the Federal Communications Commission (FCC), and the Environmental Protection Agency (EPA) (Pride and Ferrell 80).
Ideas are also products – they can be sold using a lot of the same strategies as tangible goods. By the 1930s, the notion of regulating harmful ideas was part of the discussion and remains so to the present day (Baran and Davis 68). An influential compendium of the state of scholarship on media effects, The Effects of Mass Communications, was published by Joseph Klapper in 1960. Klapper’s opinion was that media was more of a reinforcer than a dictator of current culture because there were mitigating social institutions in peoples’ lives such as churches, families and schools (Baran and Davis 114). If media actors with self-serving and destructive intentions wanted a strategy for how to break down society to bend more people to their will, it was made readily available to them, however unintentionally, by Klapper and other theorists.
Consumer protection laws of a sort directed at media and advertising do currently exist under the auspices of agencies like the FTC and the FCC. Normally these laws don’t deal much with physical harm unless the issues are safety related. Physical injury is however sometimes considered as part of the negligent infliction of emotional distress tort in some states. It is acknowledged in some jurisdictions that physical assault can cause emotional distress, and severe emotional distress can cause harmful physical symptoms and disease (Trager et al 185). If the link between the media and emotional abuse is better studied and acknowledged, and the link between emotional distress and physical disease is likewise given due consideration, a pathway to further regulation of media to protect consumers might be blazed through studies of the physical sufferings of those harmed when media abuse goes too far.
The FCC is permitted to regulate broadcast media to an extent because the airwaves are considered the property of the people. Broadcast stations are thought to have a responsibility to the public due to the people’s ownership of the airwaves (Trager et al 402-403). It is less clear who, if anyone, “owns” the internet, but it was originally partially developed by US taxpayer-supported institutions (Press). As of 2015 the amount of foreign ownership of US communications companies was capped at 25% with the then-current FCC commissioner proposing to raise the cap on foreign investment or eliminating it entirely (Traeger et al 404). The policy that foreign companies would be allowed to own anything that US citizens own or paid to develop is something the FCC could reconsider by following their normal procedures for a change of policy (Traeger et al 401). Any corporation, association or individual affected by FCC regulations has the legal right to a challenge in Federal appellate court (Traeger et al 402). Foreign exploitation via international internet scams is rampant all over the world but we still allow access to our citizens by criminals from foreign countries who don’t participate in international anti-fraud measures (“Report international scams…”). Economic exploitation tips the power balance in the abuser’s favor (Bancroft 156).
Tactics Employed by Domestic Abusers
Here are some of the techniques that abusers use to gain control over their victims (Bancroft 74, 145-146, 213-214, Dwyer 55-56).
Ridicule, name calling, insults, put-downs, and sarcasm
Distorting what was said
Accusing you of doing what they do, or thinking the way they think (projection)
Using a tone of absolute certainty and final authority – “defining reality”
Turning your grievances around to use against you
Criticism that is harsh, undeserved, or frequent
Provoking inappropriate guilt
Playing the victim
Threatening to harm you
Discrediting, spreading rumors
Getting other people to put pressure on you
Spreading confidential information (doxxing)
Presenting one face in public and another in private to gain credibility and trust
Using events from the past or situations that can’t be changed as a reason a person should accept poor treatment
Separating the target from sources of support
It is not easy sometimes for us to imagine that our entertainment providers would knowingly set out to abuse us, the consumers. People often feel warm emotions toward celebrities and providers of entertainment. A paper by Eduard Sioe-Hao Tan suggests why that might be the case (Tan 45). “A lay person’s understanding of what it means to entertain somebody involves being amusing or giving pleasure, activities associated with being a good host to a guest.” The entertainer may be considered responsible for voluntarily rendering a personal service to the viewer (Tan 45).
One trap that is easy for consumers to fall into is to forget that we are not really the ultimate customers for most entertainment products – the advertisers and sponsors are. We may be the audience, but we are not the customer. When considered in that light, it is a little more understandable why entertainment and media companies would be willing to actively abuse us, or at least not care if we become collateral damage.
In an article for Psychology Today, Dr. Jim Taylor proposed that what we now call “popular culture” is no longer a reflection of the genuine culture of the people, but an artificial, media-cultivated corporate culture that he names “synth culture” (Taylor “Popular Culture…”). Cultivation Analysis is the theory that the media present a view that does not necessarily reflect reality, but because people believe it does, reality changes to conform to the media (Baran and Davis 287). As early as the 1950’s, architects were creating buildings and landscapes to conform to movie and television versions of reality. The cultural landscape known as Disneyland, for example, was the product of a media corporation and was not merely appealing to existing media-cultivated tastes but actively implanting them (Hine 150-152).
If the culture we have is not based on the genuine culture of the people but is deliberately planted there by the media, I postulate that if we don’t already have it, we will end up with a government that is no longer “of the people, by the people, and for the people,” but is of the self-appointed media technocracy whose primary interest is in exploiting us (Taylor “Popular Culture…”). It’s obvious which political direction the technocracy wants us to go. If we ask why, the large media corporations have the power to remove questions from public debate through moderating content and banning users with certain views even though they claim immunity under Section 230 of the Communications Decency Act (“Does Section 230’s…”).
The Rewards of Being Abusive
Above I have listed some of abuser’s techniques – now I’ll provide some of the possible incentives that motivate people to abuse other people. Abusers enjoy the following advantages and privileges in life (Bancroft 43, 152, 153-158):
Abuse victims change their behavior and work to bolster the abuser’s self-esteem to win approval or tolerance.
Abusers gain the freedom to behave as they desire without restraint while getting lots of attention.
After being catered to, they get praise for being a great person and improve their public image when they act decent.
The comforts, privileges, and financial advantages of being catered to are too attractive to give up.
The thrill of having power is a seductive feeling.
The abuser can pick and choose low-stakes situations to act altruistic so that they can cultivate a positive image without making any actual sacrifices.
Abusing others can give the abuser temporary relief of frustration at life’s annoyances.
Others can be coerced into performing unwanted tasks or giving up resources, resulting in better quality of life or gratification for the abuser.
When people are deprived of financial resources or financial autonomy, they are much easier to control.
The abuser’s goals are prioritized while others are diminished. The abuser escapes consequences while others who would dare to engage in the same behavior are held accountable.
The abuser receives peer approval from the surrounding culture.
Disunity among a group gives the abuser more power by directing attention into fighting among themselves rather than holding the abuser accountable.
Abuse Examples and Comparisons
Here are a few examples of how members of the media have used abuse techniques to advance their agenda while disregarding the harm to individuals and society.
Abuse Example 1
Abuse benefits: Abuse victims change their behavior and bolster the abuser’s self-esteem to win approval or tolerance. Others can be coerced into performing unwanted tasks or giving up resources, resulting in better quality of life or gratification for the abuser. Financial resources are often something abusers work on transferring from their targets to themselves (Bancroft 155-156).
Abuse tactic: Using a tone of absolute certainty and final authority – “defining reality”.
Media example: The highest status people in our culture tend to be doctors, lawyers, professors, executives, politicians, sports figures and entertainers (Dwyer 19). Some of these people are at least well-educated, but many have no more knowledge or ability about most issues than we do. When people are catered to as though they are of a higher status than the common person, they often feel entitled to treat us as inferior and expect us to defer to their authority (Dwyer 19).
News content producers can be an example of media using their sense of entitlement and branding skills to claim authority they have not really earned. Before the 1970s, news programs were offered as a public service and run at a loss to the station in exchange for the right to use bandwidth on the limited public airwaves. Released from that obligation, many news programs still claim the image of public service while earning large profits by featuring “sensational, sentimental or dramatic” stories that will attract mass audiences for their advertisers (Silverblatt et al 119). In return for their airwaves generating profits for media companies, the public gains at best only low-quality entertainment disguised as news, and possibly manipulation, abuse and ill health.
Some prominent social media companies have recently declared themselves to be authorities on objective truth, supposedly in the service of their users, who they see as not as qualified to judge as their own self-declared technocracy. They employ “fact checkers” to distinguish between beneficial and harmful content. A couple of the areas they recently claim special authority on are Constitutional law and medicine (Lucas, “Does Section 230’s…”). When a technocracy was originally considered for the United States in the 20th century, sufficiently wise people, such as social scientists, religious leaders, the military, the police, Congress and the FTC were considered as members (Baran and Davis 62-63). Investigative journalists have been trying to investigate today’s new technocracy. In documenting the harsh working conditions of Facebook content moderators, journalist Casey Newton found that most of Facebook’s content moderators are employees of outside contractors. At one facility in Phoenix, content moderators are paid $28,800 per year as compared to the average Facebook employee compensation of $240,000 (Newton). Facebook periodically audits the contract workers for accuracy, with accuracy defined as what Facebook decides it is. It is unclear what the educational qualifications are to be a contracted content moderator or a Facebook employed auditor (Newton).
Abuse Example 2:
Abuse benefit: The abuser receives peer approval from the surrounding culture.
Abuse tactic: Provoking inappropriate guilt.
Media example: Netflix aired a documentary showing walruses falling to their deaths from a cliff, claiming the deaths were caused by climate change. In actuality, the falling walruses were chased by polar bears, and possibly were even frightened by the film crew’s disturbing presence in the area and noisy equipment (Foster). Netflix gained the benefit of appearing to be socially responsible while directing attention away from their own possible culpability. As professor of space architecture and author Larry Bell commented in Forbes, phenomena that we used to be taught were natural, such as earthquakes, “hurricanes, droughts, floods, blizzard cold weather conditions and such” are now our fault and we are pressured to feel guilty (Bell).
Many celebrities have shared mis-identified fire photos on social media, claiming they are current and from the Amazon rain forest, when they were sometimes not current and taken somewhere else (Richardson). Perhaps they feel less guilty about their lifestyles for spreading these often unverified messages, while at the same time enjoying social approval from their peers without having to actually sacrifice anything. One of the privileges abusers regularly enjoy is to feel better while others around them feel worse (Bancroft 31).
What is the cost to mental health of this constant bombardment of what some affix the label “tragedy porn”? Therapy for eco-anxiety is a prominent field of mental health with over 120 practitioners known as far back as 2008 (Bell). Sufferers of eco-anxiety have reported shoulder pain, fibromyalgia, fatigue, overeating, bulimia, depression and alcoholism (Bell). 96% of respondents of one study on relatively affluent Americans claimed that eco-anxiety changed their ideas about having children, 6% even going so far as to regret the ones they already have (Carrington). What is it like for a child to grow up as a regret? In one case a seven-month old baby is going to have to find out what it’s like to live through a gunshot wound in the chest as the only survivor of an Argentinian family killed in a murder-suicide pact apparently precipitated by eco-anxiety (Sacks).
Children and adults alike have been taunted with threats that important cultural traditions like Thanksgiving and Christmas will be ruined or cancelled because of climate change (Watts). This could be interpreted as doubling down on the effort to induce poor mental health in viewers because religion is one of the well-known weapons against depression, anxiety, substance use disorder, suicidal behavior and poor physical health (Whitley). Thanksgiving is a secular holiday, not a religious one, but gratitude is something both atheists and theists alike can embrace. However, too much gratitude is not good for the advertising business. If people get too satisfied with what they already have, they won’t buy as many new things. The idea that products should constantly be updated in appearance to make old versions obsolete or deliberately made not to last very long became mainstream by the middle of the 20th century in the United States (Hine 66). The media likes to encourage us to buy unnecessary products while at the same time promoting guilt in us because excess consumption is bad for the environment. That behavior results in a triple win for the media/entertainment industry and their advertising clients – they sell more products, appear to be socially responsible for infiltrating our entertainment with guilt messages, and evade accountability for their own environmental misdeeds.
Abuse Example 3:
Abuse benefit: The abuser’s goals are prioritized while others are diminished. The abuser escapes consequences while others who would dare to engage in the same behavior are held accountable.
Abuse tactics: Getting other people to pressure you, discrediting, spreading rumors, ridicule, name calling, insults, put-downs and sarcasm.
Media example: Because they claim immunity under Section 230 of the Communications Decency Act, social media corporations such as Facebook and Twitter maintain they are not liable for the actions of their users (“Does Section 230’s…”). At the same time, they can allow content they approve of and ban content they don’t approve of, boost content they favor and restrict content they disfavor, and promote or suppress users in an equivalent manner. In that way they can discredit, spread rumors, bully, harass or otherwise pressure whoever they choose by selectively enforcing speech, while avoiding proposed regulation of this privilege by manipulating public opinion to vote for whoever is unlikely to impose regulations that would reduce their technocratic control (“Does Section 230’s…”).
Sophisticated advertisers know what anxieties, fears and insecurities their target audiences are prone to, and they know how to trigger them at will and then offer products and ideas as solutions to the uncomfortable feelings that result (Silverblatt et al 291). Facebook ran a test in 2012 to see if they could go beyond mere curation and actually prompt the type of content users post on their platform by manipulating people’s moods (Meyer). They succeeded, and if there was ever any doubt, everyone now knows that they have the power to recruit their users into unconsciously propagating the media’s agendas and those of their advertisers. Fear and anxiety have been known to be aids to selling products for a long time (Packard 48, 58-59, 221-223). When Vance Packard published his book The Hidden Persuaders in 1957, the techniques advertisers studied to appeal to our fears and anxieties were still new to the public (Hine 28). Even though the methods are no longer new, they still work as the Facebook experiment demonstrates (Meyer). There are a number of possible health related side effects resulting from induced fear and anxiety, including fevers, vomiting, impotence, diarrhea, increased heart rate, fatigue, nausea, sleep problems, reduced ability to fight infections, heart disease, inflammation, irritable bowel syndrome, substance abuse, social dysfunction and suicidal thoughts (Dyer 33, 197-198, Leonard).
Even with the available legal remedies, there is a limited amount that can be done for a victim of physical or mental abuse unless they decide to stop accepting the abuse and take action to use what help is available to assist in freeing themselves. Many of the harmful mental and physical effects of media can be overcome if individuals make the decision to reclaim their agency and follow up with suitable action. Abused individuals and abused media viewers are groomed in a similar manner with deceptive seductive techniques that hide the true intent of the abuser. Abuse and grooming gradually break down the resistance and health of the target to make the target less able to fight and break free from bondage.
Dangerous and addictive products that are regulated as “vice” products perhaps provide a precedent for the legal system and government agencies to regulate abusive media in a similar manner. “Vice” products are related to activities that are not considered healthy or moral and whose use is controlled to some extent by age-related or other restrictions (Trager 547). Categories of “vice” products currently include alcohol, tobacco, hookahs, e-cigarettes, drugs, gambling, sexually explicit material, firearms and marijuana (Trager 547, 550). In the past some of the methods of combating the harm caused by the misuse of these products has taken the form of public service messages and warning labels. The battle lines which government agencies and commercial interests navigate as they both attempt to advance their opposing goals is constantly in flux, with states and local jurisdictions having a lot of leeway to tighten or loosen regulations on vice products (Trager et al 542-555). If the media is going to intentionally or negligently affect our health, I think a case can be made for providing media literacy information content on their channels in lieu of labeling on media products in exchange for the benefits their corporate owners enjoy at the public’s expense.
Some forms of media regulation have been allowed by Federal government agencies and the courts in the past to promote the ability of citizens to make informed choices about their health, welfare and the consumption of products and ideas. Here are a few examples of past attempts by the FCC.
From 1949-1989 the Fairness Doctrine required broadcast stations to provide programming that presented diverse views on controversial topics of public importance (Trager et al 408).
The personal attack rule required broadcasters to provide a rebuttal forum for the subjects of an-air attacks on their “integrity, honesty, or character”. Because the personal attack rule did not apply to public officials, it had limited power to limit one-sided attacks. Even that protection for private individuals was eliminated in 2000 (Trager et al 409).
Under the political editorial rule, private broadcasters were required to allow legally qualified candidates for public office rebuttal time in response to editorials aired either against the candidate or in favor of a rival. The political editorial rule also ended in 2000 (Trager et al 409). Public broadcasters are not allowed to endorse a candidate but can editorialize on public issues (Trager et al 409), some of which could affect the livelihoods of those who work for public broadcasters and in that case could be one-sided and self-serving. The taxpayers who fund a portion of public broadcasting involuntarily are afforded no opportunity to rebut (Trager et al 417).
Net neutrality was the requirement for internet service providers to treat all internet traffic equally and not set up paid priority service for preferred content (Traeger et al 423). Net neutrality was repealed in 2018 (Morton). Some states have started to create their own net neutrality legislation since it no longer exists at the Federal level (Morton).
There was a time when the four above regulations were considered acceptable under the First Amendment. The First Amendment has not yet changed – not the text of it anyway. I suggest that as a country we consider bringing some regulations back, as they are possible hedges against the technocracy gaining further power over us and increasing their ability to abuse.
Bancroft, Lundy. Why Does He Do That? Inside The Minds of Angry and Controlling Men. Berkeley Books. 2002.
Baran, Stanley J. and Dennis K. Davis. Mass Communication Theory: Foundations, Ferment, and Future. Seventh Edition. CENGAGE Learning, 2015.
Here is another one of my homework assignments for Media Organization and Regulations class. Please read it if you are interested in preventing financial abuse to yourself or others. Some of this information you probably know but it never hurts to have a refresher on such a critical issue. This paper has been graded but I haven’t changed anything since turning it in yet. I’ll update these comments if I do so later.
Carolyn Hasenfratz Winkelmann
Geri L. Dreiling, J.D.
MEDC 5350: Media Organization Regulations
13 December 2020
Dealing with Deceptive and Unfair Messages
The Federal Trade Commission, or FTC, has the authority based on Section 5(a) of the FTC Act to protect citizens from unfair or deceptive commercial messages. A message is considered deceptive if it is likely to mislead a reasonable consumer (“A Brief Overview…”). An unfair practice is one that causes or is likely to cause “substantial injury” which consumers cannot reasonably avoid and there are no “countervailing benefits” to justify it (“A Brief Overview…”).
The first line of defense for consumers is information. The FTC provides a web page with information to help consumers recognize deceptive messages as well as tips on what actions to take if they receive such a message (“How to Recognize…”). Blocking and reporting messages are recommended strategies. The FTC recommends reporting SPAM messages to the app the consumer is using, as well as to the FTC. The FTC investigates complaints and if unlawful activities are found, the FTC will take administrative or judicial action which may eventually result in civil penalties (“A Brief Overview…”).
An example of one case brought by the FTC to get justice and relief for victimized consumers is Federal Trade Commission vs. Ecommerce Merchants, LLC and Cresta Pillsbury, Jan-Paul Diaz, Joshua Brewer and Daniel Stanitski (Federal Trade Commission… 1). The FTC alleged that the defendants were guilty of sending 30 million unwanted SPAM messages that were not only unwanted but deceptive (Federal Trade Commission… 5-6). Just receiving the unwanted messages was financially damaging to the consumers who according to their service contracts possibly had to pay or use credits to receive the messages (Federal Trade Commission… 7). Monies that the deceptive messages generated for the defendants was deemed by the FTC to be unfair and the defendants likely to continue to offend (Federal Trade Commission… 9).
The FTC petitioned for the following actions (Federal Trade Commission… 9-10):
That the activity cease while the case is pending, the assets preserved and accounting performed.
The defendants be permanently banned from sending these messages.
The injured consumers be released from contracts, be paid restitution and refunds, and fraudulently obtained monies be confiscated from the defendants.
Repayment of court costs and other expenses deemed necessary by the court by the defendants to the plaintiff.
If implemented, it is my opinion that the above should adequately punish the offenders and repay the consumers if the victims are allowed to collect not only for the dollar value of what they lost but other expenses such as the time they spent dealing with and documenting the problem. The consumers should also be made whole if they had to pay late fees, have their credit score damaged or other such losses that can occur when a financial problem starts snowballing.
A weakness in this kind of enforcement is apparent when consumers are victimized by international scams. An organization called econsumer.gov, an initiative of the International Consumer Protection and Enforcement Network (ICPEN), attempts to unite consumer protection agencies from around the world to fight international scams. With only 40 countries participating, obviously there are many countries that do not cooperate. I think we should consider not allowing messages from countries that don’t participate in this or some similar international anti-fraud program to be sent to US-based text or email addresses.