Skip to content

eChatter

Social Media Investigations & OSINT

Category: General Social Media Information

The Dangers of Doing Your Own Social Media Background Checks

social media Background checks

Why do we feel the need to post even the most minute details of our lives on Facebook, Instagram, Twitter, and the dozens of other social media platforms? Because social media is now a part of our daily lives and without we feel lost. What users don’t realize is that everything they post is a reflection of them…the good, bad, and ugly.

For employers, this seems like a treasure trove with social media being the perfect place to begin a background check. And every once in a while you hear stories pop up of applicants losing out on opportunities because prospective employers discovered something incriminating on their social media pages.
However, employers now need to think twice before checking applicants’ social media pages for background information. Why you ask? Let’s dive deeper into this issue.


Protected Information
Title VII of the Civil Rights Act of 1964 prohibits discriminating against people in employment. Particularly, it outlaws discrimination on the basis of color, race, gender, religion and national origin. This makes it illegal to deny someone employment on the basis of these characteristics (classified as “protected information”).
Visiting an applicant’s social media page is almost guaranteed to provide access to protected information. The pictures and posts most often reveal an applicant’s gender, race, color and so on. Just accessing this information is a breach of anti-discrimination laws. If an applicant finds out and sues the employer, it becomes extremely difficult for the employer to claim that the information did not play a part in their decision making.
If you really must conduct a social media background check, your best option is to have a third-party person screen applicants based on specific criteria for jobs. This way, hiring managers can make their decisions about applicants without knowing characteristics like race, ethnicity or marital status.


False Image/Mistaken Identity
What happens when a social media background check comes back squeaky-clean? Nothing embarrassing, unethical or illegal is found…does this mean that the applicant is flawless? Obviously no, everybody knows that people can create multiple social media accounts.
Most people who behave in questionable ways online often create pseudonyms, accounts with no relation to their actual names. This factor reveals another flaw in conducting social media background checks. Because people mask their identities online, the check can reveal nothing incriminating. Meanwhile, the applicant can be far from squeaky clean.
Another problem with running a search is the possibility of mistaken identity. How do you know that the John Smith you’re looking at is the same one applying for a position? If there are multiple accounts with similar names the risk of misidentifying the person, and thus making a wrong decision is quite high.
Even when the account contains personal details and pictures of the applicant, this doesn’t mean that it is owned and run by them. There have been numerous cases where people – with the sole aim of malice – have created accounts in the names of other people. These accounts are often filled with enough personal details to make them look authentic. They are then peppered with racist, misogynistic, pornographic or other kinds of content designed to make the person look bad.

What Can Employers Do?
There are so many legal issues to avoid when using social media in the candidate screening processes, some HR professionals might wonder whether it’s worth all the trouble. The answer is yes—if it’s done carefully. Social media can expand the pool of applicants and shed valuable light on job candidates—when a disciplined approach is used, experts say.
“The benefits of using social media in recruiting are clear,” said David S. Baffa, a partner with Seyfarth Shaw in Chicago. Although it’s true there is a potential for costly lawsuits against employers who misuse social media, “most of the stuff you hear about potential risks, I haven’t seen it play out in litigation.”
The biggest concern with using social media in the hiring process is discrimination. Social media provides employers with information that they might not obtain otherwise or might not obtain until they conduct a face-to-face interview. Once the process moves to the screening phase, have someone other than the employment decision-maker do the screening, advises Jason Morris, president and COO of EmployeeScreenIQ in the Cleveland area. “Create a firewall between this person and the decision-maker,” he said, particularly if the screening will involve social media sites.
The screener should look online for certain red flags such as hate speech, violent tendencies, or drug use that would have a direct bearing on the candidate’s potential job performance. Employers should keep in mind that background-screening companies that use social media sites are subject to the provisions of the Fair Credit Reporting Act, under which applicants must give permission for pre-employment investigations.


Diversify the Applicant Pool
Another problem with using social media—particularly LinkedIn and Facebook—is that these sites have lower percentages of Latino and black users than are in the general population. That puts the burden on employers to widen their job searches through other means, such as job boards, newspapers, magazines and job fairs. Experts urge organizations to post notices on their websites that they are equal opportunity employers and that they seek a diverse pool of applicants from many sources.

 
About Us:
We have been mining social media since 2007 for our clients. By utilizing best in class software programs, we offer a service called eChatter.
eChatter works with you to obtain your objectives in a fast, accurate and reliable facet. By keeping our strengthened principals, yet evolving with this industry, we lead in social media monitoring. Since 2007, we have been dedicated to providing our customers with the most authentic data.

We offer:
• Deep Web Scans
• Jury Vetting
• Jury Monitoring
• Social Media Background Checks

www.e-chatter.net
(866) 703-8238

Author eChatterPosted on December 10, 2018December 10, 2018Categories General Social Media Information, Human Resource MaterialsTags backgroundchecks, social media background checks, social media monitoringLeave a comment on The Dangers of Doing Your Own Social Media Background Checks

Online Reputation Management

Online Reputation Management

It’s not just about resumes anymore…

When applying to college and potential jobs, experts now advise you take it a step further. Creating or updating a LinkedIn profile as well as examining your social media pages can save your reputation and make sure you are putting our best foot forward. It’s good practice to check a few times a year, and remove potentially embarrassing or damaging information. Removing information from the web doesn’t mean it’s gone forever — you should be ready to account for it — but at least you are taking control of the profile that everyone will see. You are updating your online persona to reflect who you are today.

Ann Yates, principal with the executive search firm Witt/Kieffer, explains, “In my work as a search consultant, there isn’t a week that goes by that I don’t speak with candidates for administrative jobs about a personal or career misstep they’ve made and how to handle it in the hiring process. Because so much information is available about job candidates today, search committees must think carefully about how it influences their decisions.”

“They are going to click on your profile,” says Alan Katzman, the chief executive of Social Assurity, a company that offers courses for high school students on how to shape their online images. Last year, Mr. Katzman’s company advised a high school senior in the Washington area to create a detailed LinkedIn profile and include a link on his application to Harvard. Soon after, LinkedIn notified the student that someone from Harvard had checked out his profile. Mr. Katzman says that high school students who use social media to showcase themselves may gain an edge with colleges. “No one has quantified the power of this,” Mr. Katzman told me recently. “But I maintain that it is very powerful.”

Vicky Rideout, a researcher who studies how teenagers use technology, says “Using LinkedIn on college applications, she says, “is yet another way for there to be a disparity between the haves and the have-nots.” A recent study from Kaplan Test Prep of about 400 college admissions officers reported that 40% said they had visited applicants’ social media pages, a fourfold increase since 2008.

Some high school students are establishing LinkedIn profiles to give the colleges that do look something they would like them to find. Students who naturally tailor posts for their peers on Instagram, Twitter or Facebook told me they used the professional network as a separate space to market their accomplishments to adults.

“I did not make a LinkedIn profile for my friends,” says Matthew Martratt, a 17-year-old high school senior in Marietta, Ga., who is an Eagle Scout and a member of his school’s marching band and organizes community service projects. “I made it to show people who don’t know who I am what I am about.”

Mr. Martratt, who took a LinkedIn course from Social Assurity, said he followed colleges to which he intended to apply on LinkedIn and Twitter and posted about them. “It’s like sending them an invitation to look at my profile,” he said. “When I get likes or notifications back, it shows that they are looking.”

LinkedIn has proven it’s the place to find and be found. The site has well over a million and a half student jobs and internships. And more than 9 in 10 companies use LinkedIn to recruit new hires.

online reputation

 

Want to make your profile stand out?

 

Follow these top tips:

 

1) Upload an appropriate photo. Profiles with photos get 14x more views.

2) Write an informative but catchy profile headline.

This is a short, memorable professional slogan. It’s the one thing you want a recruiter, hiring manager, or future co-worker to know about you.

3) Make good use of the Summary statement.

Think of the Summary like the first few paragraphs of your best-written cover letter: Concise about your experience, qualifications, and goals. Describe what motivates you, what you’ve done and are skilled at, and what makes you unique. Be clear and confident!

4) Be smart about your experience.

List the jobs you’ve held and a brief description of what you were responsible for and what you accomplished. This section can be more or less detailed than your resume. What really matters is that you’re not leaving out critical details about your work history.

And don’t forget your volunteer activities. 20% of hiring managers in the U.S. say they’ve hired someone because of volunteer experience. It’s also a good profile addition because it reveals your passions and rounds you out as a human being.

5) Show your work.

You can now add real examples of your writing, analysis, design portfolios, or other work directly on your profile. Upload or link to rich media, documents, or presentations. This helps make your profile more visual and interesting, while demonstrating your value as an up-and-coming professional.

 

 

 

Author eChatterPosted on November 19, 2018November 8, 2018Categories General Social Media Information, Human Resource Materials, reputation managementTags Fake social media accounts, Online Reputation Management, social media reputationLeave a comment on Online Reputation Management

Social Media Identity Theft

Social Media Identity Theft

How to protect you and your children’s accounts

Social media is no longer just a way for us to connect with friends and family. It’s how we connect with the world in general. By sharing photos, kids sporting events, places we like to visit, vacations, and other personal information, we make it easy for cyber thieves to gather specific data about our lives.

What exactly is cyber identity theft?

Online or cyber identity theft refers to a group of behaviors that can unfairly jeopardize or tarnish a victim’s reputation. Most commonly, this form of identity theft involves using someone’s likeness online, usually to pose as them and supplant their existing online presence.

For example, many parents like to share pictures of their kids online. But posting those precious photos could result in issues with identity theft, advertisements, or online predators.

Bree Fowler is the privacy editor for Consumer Reports. She warns parents to be careful. “Seemingly harmless information like your child’s name, their age, what they look like, where they go to school, all of that information can be used to create a profile that a hacker can use down the road for identity theft,” said Fowler.

How can you be sure your child’s identity is safe?

  1. Set your social accounts to their highest security and privacy settings.You should ensure that none of your accounts are leaking information to parties whom you don’t intend to share information. Also, make sure that you review your social media post visibility after software updates to make sure your settings remain private. Finally, make sure that your account security is strong by using complex and unique passwords, two-factor authentication and good account reset questions.
  2. Don’t use hashtags. It makes it easy for cybercriminals to find your photos.
  3. Don’t use geotags. It gives criminals an easy way to find your child’s location. If you do not change your privacy settings, each time you post or add new pictures it will tag the exact location where you posted from.
  4. Be skeptical of links to unfamiliar websites, especially ones that promise shocking video, photos or gossip. They may be designed to hijack control of your account and information, and trick your friends into doing the same.
  5. If you log into social media on someone else’s computer, remember to log off before leaving and do not check the box to remember your username or password.

 

Identity Theft

 

What can you do if you become a victim?

  1. Contact the admins of the site or service where your identity is being abused or where your account was stolen.
  2. Notify friends, family and followers, if possible.Anyone who you regularly talk to or do business with has a right to know that you’re no longer in control of your online identity so that they don’t fall for any scams your identity thief might try.
  3. Monitor your online identity and change your passwords.As a precaution, you might want to monitor your other online accounts to verify that they haven’t been breached as well. Also, consider an identity theft protection service. Most of the top-rated services will monitor the use of your information on the Internet black market, allowing you to catch further abuse of your identity.

 

 

 

 

 

 

Author eChatterPosted on November 8, 2018Categories General Social Media Information, Parents CornerLeave a comment on Social Media Identity Theft

White Collar Crime

White Collar Crime

White-collar crime is defined as a range of frauds committed by business and government professionals. The motivation behind these crimes is almost always financial—to obtain or avoid losing money, property, or services or to secure a personal or business advantage.

These crimes can do major harm…a single scam can destroy a company, wipe out a family’s life savings, or cost investors billions of dollars (or all of the above). Due to our advances in technology and intelligence, today’s fraud schemes are more sophisticated than ever.

The FBI is dedicated to using its skills to track down the culprits and stop scams before they start by targeting sophisticated, multi-layered fraud cases that harm the economy. FBI agents work closely with law enforcement and regulatory agencies such as the Securities and Exchange Commission, the Internal Revenue Service, the U.S. Postal Inspection Service, the Commodity Futures Trading Commission, and the Treasury Department’s Financial Crimes Enforcement Network and investigate criminal activities such as public corruption, money laundering, corporate fraud, securities and commodities fraud, mortgage fraud, financial institution fraud, embezzlement, fraud against the government, election law violations, and health care fraud.

What  are the major threats of White Collar Crimes? 

 

Corporate Fraud

Corporate fraud has the potential to cause immeasurable damage to the U.S. economy and investor confidence, which is why it continues to be one of the FBI’s highest criminal priorities. The Bureau focuses its efforts on cases that involve accounting schemes, self-dealing by corporate executives, and obstruction of justice.

The majority of corporate fraud cases investigated by the FBI involve accounting schemes designed to deceive investors, auditors, and analysts about the true financial condition of a corporation or business entity.

The FBI’s corporate fraud investigations primarily focus on the following activities:

Falsification of financial information

False accounting entries and/or misrepresentations of financial condition; fraudulent trades designed to inflate profits or hide losses; and illicit transactions designed to evade regulatory oversight.

Self-dealing by corporate insiders

Insider trading (trading based on material, non-public information); kickbacks; misuse of corporate property for personal gain; and individual tax violations related to self-dealing.

Today, thanks to the internet and tax havens, it is even easier for white-collar crime to slip under the radar: Cash is stashed in untouchable island accounts; corporate checks can be forged and deposited; money laundering takes the form of a prepaid debit card; insider trading is just a conversation over cocktails.

Check Fraud

Checks can be useful tools when it comes to corporate theft and account takeovers. To steal from a business, says Frank Abagnale, whose criminal exploits inspired the movie “Catch Me if You Can,” the best forgers “capture a corporate logo and maybe the front of the building — layer it in the background, and make a check look 10 times better than the actual check.” Then they call the company and explain that they want to pay an invoice by wiring money to the institution, in which they are told where it does its banking and are given its routing and account numbers.

They obtain the CEO or CFO’s signature by asking someone in corporate communications to give them a press statement and that signature is printed right onto the fake check. It is not likely be scrutinized unless the amount is more than $2,000. “No human being sees the check — it goes through a high-speed processor,” Abagnale says. For the last 40 years, he has been a consultant to financial institutions and government agencies, telling them how to combat forgery. Around 17 billion checks, with a value of roughly $27 trillion, were written in 2015, according to the Federal Reserve.

Another, more common way to use checks fraudulently is to take over an individual’s account. “Let’s say you gave me a check for $9,” Abagnale says. “All I would do is go to checksinthemail.com.” It’s possible for fraudsters to match the style of check they’ve been given and then order with a different name on the check along with the bank account information of the unsuspecting person. When the other person’s bank receives those checks, it will debit that account. The swindler can pay rent and credit-card bills or visit a local check-cashing operation and walk away with thousands of dollars. “It’s months later that anyone would discover it,” Abagnale says. “And the bank is responsible for paying both parties even if the business files a complaint within 30 days.”

 

Money Laundering

 

Offshore Tax Haven

People who want to keep their money away from the tax collector will move it to a foreign country. “When you have more than $20 million, then you’re going to start being targeted by these financial institutions,” says Gabriel Zucman, an assistant professor of economics at the University of California, Berkeley, and the author of “The Hidden Wealth of Nations.”

Switzerland controlled approximately 50% of the “offshore” accounts used by the world’s wealthiest until the financial crash in 2008. Today that figure is roughly 25%. Now, Singapore and Hong Kong are home to 30% of offshore accounts in use, while the rest are in the Caribbean, Panama and Europe.

“There are intermediaries — law firms that can connect people to banks, and they supply these anonymous shell companies,” Zucman says. Once the shell company is established, it will send an invoice for phony services like investment advice. Payment for these services then goes to the offshore bank account attached to the shell company. The resulting paper trail looks legitimate.

Zucman estimates that an amount equivalent to 8% of the world’s household financial wealth is held, untaxed, in offshore accounts — around $8.6 trillion in 2016. Accessing money in an offshore account is as easy as using a debit card from the offshore bank or taking out a loan in the United States against the assets held abroad. “You don’t have to show up,” Zucman says. “It can all be done remotely.”

 

Insider Trading

Employees at publicly held companies often possess something quite valuable to outside investors: knowledge about their employers’ prospects beyond what has been issued in news releases. Those who would share — and perhaps illegally profit from — this intelligence in order to play the stock market know to circulate among their company’s various departments, says Roomy Khan, a former analyst at Intel who went to prison for passing nonpublic information to Raj Rajaratnam, the billionaire founder and former chief of the Galleon Group hedge fund and others.

“I was always trying to make connections in the company’s finance department and the marketing chain,” Khan says.

When it comes to buying or selling stocks based on those predictions, insider traders must avoid being consistently accurate. Too many on-the-spot and out-of-the-ordinary trades that are correct can raise flags. “The government spots insider traders,” says Khan, who now gives speeches to companies about the dangers of insider trading. The feds aren’t the only ones monitoring unusual trades. Companies can get in trouble if they have too many leaks, and so can investment funds if they act on them, so both types of businesses are looking out for suspicious activity.

Manipulation is the key to gaining confidential information, but insider traders try to be casual and friendly; people are more easily persuaded to share if they are made to feel powerful, wanted and included in the upper echelons of financial society.

 

Money Laundering

To launder dirty money in the United States, illegal enterprises must “structure” their deposits of ill-gotten cash. Banks are required to report transactions involving $10,000 or more in cash, so their deposits need to be much smaller than that. “Criminals understand that U.S. banking laws have become a lot stricter in the last several years,” says Adam Braverman, United States attorney for the Southern District of California. Would-be launderers try to avoid raising red flags by varying their deposits­—by amount, location, and even timing.

The old-fashioned way of laundering money would be smuggling cash across a border. It’s best to vacuum-seal it or pack it with plastic wrap to reduce the bulk — a million dollars can take up a lot of space — and hire a courier to transport it in duffel bags to a country with lax banking laws. Once the money is in another country, dollars can be exchanged for the local currency. The United Nations estimates that up to $1.6 trillion is laundered annually worldwide.

 

About Us:

We have been mining social media since 2007 for our clients. By utilizing best in class software programs, we offer a service called eChatter.

eChatter works with you to obtain your objectives in a fast, accurate and reliable facet. By keeping our strengthened principals, yet evolving with this industry, we lead in social media monitoring. Since 2007, we have been dedicated to providing our customers with the most authentic data.

 

We offer:

·       Deep Web Scans

·       Jury Vetting

·       Jury Monitoring

·       Quick Scan

 

www.e-chatter.net

(866) 703-8238

 

Author eChatterPosted on August 15, 2018August 1, 2018Categories Corporate, General Social Media Information, Law EnforcementTags Corporate Crime, Corporate social media monitoring, government social media monitoring, White Collar CrimeLeave a comment on White Collar Crime

Should Schools Monitor Social Media 
For Threats?


Should Schools Monitor Social Media 
For Threats?


More and more schools are now hiring online security companies to scan social media for threats…take Orange County Schools for example. They just hired a social media investigation company who will monitor public social media content, flag possible threats and notify school officials of threats against school students, staff, and events, according to an OCS press release. The service, which will cost the school district about $10,000 a year, will look for keywords in social media that may post a threat to students, staff, or the local community.

Orange County Schools’ Superintendent Todd Wirt said students, parents, and staff are acutely aware of the need for implementing as much safety and security as possible in the school community. “When we find ways to secure our schools – whether it’s building safety measures into our schools or responding to online threats – we want our families to know that the safety of our students and staff is the top priority,” Wirt said.

The OCS statement said an administrator would conduct social media screening, review any red flags in context to determine the “type and severity” of any potential threats, and start working with law enforcement. OCS officials did not say what constitutes a threat, how data will be stored, or what role law enforcement will play.

With the 2017-18 school year going on record as the deadliest school year in decades, school leaders are trying to figure out how to prevent more school tragedies. The need to protect the lives of students and teachers has caused school districts to examine a number of solutions, including the increased monitoring of online threats, social media background checks, and consulting with social media intelligence experts.

monitoring the web

These programs look for keywords that indicate threats of violence to others or self-harm. Those in favor of the program say that such measures reduce threats and prevent potential suicides, however, critics of social media screening point to possible violation of privacy concerns, potential human rights violations, and the possible misuse of such monitoring by schools to target students of color.
But in the war against potential threats, monitoring of keywords in public posts may be a way schools can be proactive. As Stephen Halkiotis, the chairman of the Orange County Board of Education said in response to criticism that the service is an invasion of privacy, “I think you give up your privacy when you decide to put your heart’s feelings, whether they’re positive or negative, on the Internet.”

The Cons:

Social media can contribute to psychological trauma and other challenges. Potential risks include the following.

• Cyberbullying or other online conflicts
• Quick and widespread communication of crisis-related rumors, false information, or
embarrassing and inappropriate information
• Potential for triggering crises, increasing perceptions of threat and fear, or creating crisis
contagion
• Affects privacy
• Potential for overuse or as a consistent substitute for face-to-face socializing
• Time consuming for educators, parents, and other caregivers to learn and monitor

The Benefits:

While social media screening can bring about challenges that are concerning, social media is a reality that is here to stay. Educators are encouraged to understand how social media can help prevent and respond to crisis risks by addressing the following:

• CRISIS PREVENTION
• Helping to create an extended sense of community or culture
• Encouraging positive behavior, responsibility, and healthy relationships in schools, homes,
and in the community.
• Conducting online surveillance (e.g., monitoring crisis warning signs or threats; for example,
Facebook has partnered with the National Suicide Prevention Lifeline to create a suicide
reporting mechanism).

• CRISIS INTERVENTION
• Quickly communicating accurate information following a crisis.
• Rapidly dispelling rumors or other false information.
• Evaluating individuals who may be affected by a crisis situation
• Quickly disseminating information about how others can access mental health resources
following a crisis.
• Quickly coordinating crisis response efforts.

• Create and/or understand social media policies. Schools and community organizations are
encouraged to create and communicate social media policies. Parents, caregivers, and others in
the community can familiarize themselves with such policies.

• Prioritize ongoing social media training, both formal and informal. Research related to how
social media and crises interact is limited. Social media platforms and applications also
evolve quickly. Stay informed about current social media being used by youth and adults in
your community. Youth in the community can take on the role of cultural brokers by informing
educators, parents, and other adults about what and how social media are being used.

About Us:
We have been mining social media since 2007 for our clients. By utilizing best in class software programs, we offer a service called eChatter.
eChatter works with you to obtain your objectives in a fast, accurate and reliable facet. By keeping our strengthened principals, yet evolving with this industry, we lead in social media monitoring. Since 2007, we have been dedicated to providing our customers with the most authentic data.

We offer:
• Deep Web Scans
• Jury Vetting
• Jury Monitoring
• Quick Scan

www.e-chatter.net
(866) 703-8238

Author eChatterPosted on July 18, 2018Categories General Social Media Information, Parents CornerTags school social media, schools monitoring social media, social media monitoring, social media threatsLeave a comment on Should Schools Monitor Social Media 
For Threats?


Posts pagination

Previous page Page 1 … Page 11 Page 12 Page 13 … Page 22 Next page

Recent Posts

  • Social Media Search vs. Social Media Investigation: What’s the Difference?
  • Gang Activity and Group Affiliations Identified Through Social Media Posts
  • Why Slang Matters in Social Media Investigations
  • Micro-Blogging Madness: Surviving the Post-Twitter Apocalypse 
  • Be Real: The Authentic Photo-Sharing App Changing Social Media

Categories

  • Corporate
  • Dating Safety
  • Fraud
  • General Social Media Information
  • Human Resource Materials
  • Insurance
  • Investigations
  • Law Enforcement
  • Litigation
  • Online Harassment
  • Parents Corner
  • reputation management
  • School Resource Officer
  • Security online
  • Social Media Investigation
  • Uncategorized

Check Out Our Other Blogs

  • Inside the Customer Journey
  • Social Media Management Blog

Connect with me

Link to our Facebook Page
Link to our Twitter Page

Pages

  • About Our Company
  • Contact Us
  • Using Open Source Intelligence Techniques
  • Visit Our Website
eChatter Proudly powered by WordPress