Feeds

Facebook defends teen security tricks

No change is good

The Power of One eBook: Top reasons to choose HP BladeSystem

RSA Facebook has defended its privacy protection despite the possibility that this has been circumvented for the first time by an alleged sexual predator.

The teen-tastic site's chief privacy officer Chris Kelly told security experts Facebook offers a robust system to protect identities of its 16 million participants and to exclude pedophiles. Facebook uses a combination of algorithms to spot dodgy traffic with "real-world" social techniques.

He rejected employing technology such Zephyr at MySpace, which enables parents to track their children's name, age and sites visited in MySpace, and objected to emailing Facebook participants about potential dangers online and safety steps as tantamount to spam.

Kelly, speaking during an RSA Conference panel on youth and the internet, offered his re-assurances despite an Illinois man having been arrested the day before for allegedly using Facebook to lure a 15-year-old boy while posing as a teenage girl. He told the Chicago Tribune this was the first time Facebook has been used to contact a minor for predatory reasons

Facebook, of course, made its mark as a network for college students, with participants using university-based email address to access the service.

The site is broadening its catchment pool to include school kids. As most schools don't offer pupils email networks, Facebook has introduced a system where new members can be invited to join - presumably by other students.

Highlighting this system's inherent weakness in keeping out adults, Kelly suggested one way for anxious parents to keep an eye on their teens would be to get their own Facebook profile and "befriend" their child online.

But reports that one in seven children are sexually propositioned online has now propelled politicians to act on social networking sites. Bi-partisan legislation was last week introduced by senators John McCain and Charles Schumer that would force offenders to submit their email addresses and online identities and that would allow social networking sites and law enforcement to detect screen out sexual predators. Facebook, like MySpace, are backing the Keeping the Internet Devoid of Sexual Predators (KIDS) Act of 2007.

In the meantime, Facebook is working on a set of tips for online safety for use by schools.®

Designing a Defense for Mobile Applications

More from The Register

next story
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.