Feeds

Facebook defends teen security tricks

No change is good

Secure remote control for conventional and virtual desktops

RSA Facebook has defended its privacy protection despite the possibility that this has been circumvented for the first time by an alleged sexual predator.

The teen-tastic site's chief privacy officer Chris Kelly told security experts Facebook offers a robust system to protect identities of its 16 million participants and to exclude pedophiles. Facebook uses a combination of algorithms to spot dodgy traffic with "real-world" social techniques.

He rejected employing technology such Zephyr at MySpace, which enables parents to track their children's name, age and sites visited in MySpace, and objected to emailing Facebook participants about potential dangers online and safety steps as tantamount to spam.

Kelly, speaking during an RSA Conference panel on youth and the internet, offered his re-assurances despite an Illinois man having been arrested the day before for allegedly using Facebook to lure a 15-year-old boy while posing as a teenage girl. He told the Chicago Tribune this was the first time Facebook has been used to contact a minor for predatory reasons

Facebook, of course, made its mark as a network for college students, with participants using university-based email address to access the service.

The site is broadening its catchment pool to include school kids. As most schools don't offer pupils email networks, Facebook has introduced a system where new members can be invited to join - presumably by other students.

Highlighting this system's inherent weakness in keeping out adults, Kelly suggested one way for anxious parents to keep an eye on their teens would be to get their own Facebook profile and "befriend" their child online.

But reports that one in seven children are sexually propositioned online has now propelled politicians to act on social networking sites. Bi-partisan legislation was last week introduced by senators John McCain and Charles Schumer that would force offenders to submit their email addresses and online identities and that would allow social networking sites and law enforcement to detect screen out sexual predators. Facebook, like MySpace, are backing the Keeping the Internet Devoid of Sexual Predators (KIDS) Act of 2007.

In the meantime, Facebook is working on a set of tips for online safety for use by schools.®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.