Feeds

Facebook defends teen security tricks

No change is good

Secure remote control for conventional and virtual desktops

RSA Facebook has defended its privacy protection despite the possibility that this has been circumvented for the first time by an alleged sexual predator.

The teen-tastic site's chief privacy officer Chris Kelly told security experts Facebook offers a robust system to protect identities of its 16 million participants and to exclude pedophiles. Facebook uses a combination of algorithms to spot dodgy traffic with "real-world" social techniques.

He rejected employing technology such Zephyr at MySpace, which enables parents to track their children's name, age and sites visited in MySpace, and objected to emailing Facebook participants about potential dangers online and safety steps as tantamount to spam.

Kelly, speaking during an RSA Conference panel on youth and the internet, offered his re-assurances despite an Illinois man having been arrested the day before for allegedly using Facebook to lure a 15-year-old boy while posing as a teenage girl. He told the Chicago Tribune this was the first time Facebook has been used to contact a minor for predatory reasons

Facebook, of course, made its mark as a network for college students, with participants using university-based email address to access the service.

The site is broadening its catchment pool to include school kids. As most schools don't offer pupils email networks, Facebook has introduced a system where new members can be invited to join - presumably by other students.

Highlighting this system's inherent weakness in keeping out adults, Kelly suggested one way for anxious parents to keep an eye on their teens would be to get their own Facebook profile and "befriend" their child online.

But reports that one in seven children are sexually propositioned online has now propelled politicians to act on social networking sites. Bi-partisan legislation was last week introduced by senators John McCain and Charles Schumer that would force offenders to submit their email addresses and online identities and that would allow social networking sites and law enforcement to detect screen out sexual predators. Facebook, like MySpace, are backing the Keeping the Internet Devoid of Sexual Predators (KIDS) Act of 2007.

In the meantime, Facebook is working on a set of tips for online safety for use by schools.®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.