The Epidemic of Oversharing
Claire Moravec
Deputy Homeland Security Advisor to the Governor & Illinois’ Deputy Director of Homeland Security | ex-Snap, ex-FBI
Society is now conditioned to communicate both personally and professionally via social media. The intention behind social media platforms was to create an environment for users to share information, foster connection and creativity, and allow for the creation and promotion of user-generated content (UGC). One of the unintended consequences, however, was the birth of a new environment that allowed for bad actors – hackers, identity thieves, spies, violent criminals, and even terrorists – to gain access to your personal information. ?
The challenge, regardless the sophistication level of the bad actor, social media users. People are oversharers.
Prior to social media, adversaries gathered human intelligence (HUMINT) through old fashioned, boots on the ground surveillance. In the digital age, social media has become the primary HUMINT reconnaissance tool. In broadcasting personal information, and sharing personally identifiable details about oneself and others, individuals are effectively creating virtual dossiers, teeing both themselves, their friends, family, and coworkers up to be exploited.
So, I ask that before you post something online, you reflect on these questions:
These questions aren’t meant to turn you into a social media curmudgeon, but rather, create an internal check-and-balance against the epidemic, and subsequent consequences, of oversharing on social media.
In 2021 there were nearly 1.4 million reports of identity theft received by the Federal Trade Commission (FTC), and consumers reported losing over $5.8 billion to fraud overall in 2021, an over 70% increase from the previous year. [10] Social media was one of the leading causes for these rising numbers. The rate of social media account takeovers increased by more than 1,000% in a one year due to phishing attacks and identity-based scams, costing 27% of individuals and 87% businesses revenue losses. [11]
A Path Forward
In addition to being cautious with what we share online, and who we share it with, steps everyone can take to improve their digital posture include:
While course-correcting oversharing behaviors in a culture known for its oversharing will be uphill battle it’s a worthy fight to combat identity-based crimes that begin on social media.
领英推荐
The views and opinions expressed are that of the author and not those of the FBI or any other U.S. government agency.
[1] Tessian. HOW TO HACK A HUMAN. Retrieved from https://f.hubspotusercontent20.net/hubfs/1670277/%5BCollateral%5D%20Tessian%20Research/%5BTessian%20Research%5D%20How%20to%20Hack%20a%20Human/%5BTessian%20Research%5D%20How%20to%20Hack%20a%20Human.pdf?__hstc=170273983.5a52778ae3ec548b43f13d9c6d234270.1657802751851.1657802751851.1657802751851.1&__hssc=170273983.1.1657802751851&__hsfp=3791126892
[2] Tessian. HOW TO HACK A HUMAN.
[3] Tessian. HOW TO HACK A HUMAN.
[4] Tessian. HOW TO HACK A HUMAN.
[5] Tessian. HOW TO HACK A HUMAN.
[6] Tessian. HOW TO HACK A HUMAN.
[7] Tessian. HOW TO HACK A HUMAN.
[8] Tessian. HOW TO HACK A HUMAN.
[9] Tessian. HOW TO HACK A HUMAN.
[10] Federal Trade Commission. NEW DATA SHOWS FTC RECEIVED 2.8 MILLION FRAUD REPORTS FROM CONSUMERS IN 2021. Retrieved from https://www.ftc.gov/news-events/news/press-releases/2022/02/new-data-shows-ftc-received-28-million-fraud-reports-consumers-2021-0
[11] Identity Resource Center. IDENTITY FRAUD TO AFFECT GENERATIONS DIFFERENTLY; THE IDENTITY THEFT RESOURCE CENTER’S 2023 PREDICTIONS SHOW SHIFT TO SOCIAL MEDIA ATTACKS & MORE SCAMS. Retrieved from https://www.idtheftcenter.org/post/identity-fraud-affect-generations-differently-identity-theft-resource-center-2023-predictions/