Newspaper Archive of
Feather River Bulletin
Quincy, California
August 13, 2014     Feather River Bulletin
PAGE 7     (7 of 32 available)        PREVIOUS     NEXT      Full Size Image
PAGE 7     (7 of 32 available)        PREVIOUS     NEXT      Full Size Image
August 13, 2014

Newspaper Archive of Feather River Bulletin produced by SmallTownPapers, Inc.
Website © 2019. All content copyrighted. Copyright Information.     Terms Of Use.     Request Content Removal.

Feather River Bulletin Wednesday, Aug. 13, 2014 7A ,a new t! 'pe of-online phisher is mlntng social media sites "Phishers," the crafty perps employment background; 10 friends listed but no photo, who scam people via emall, address and pet's name; and one with a photo and 10 are now trolling social media favorite vacation sites plus friends," he explains. "All the sites to steal vast amounts of when a person is leaving and characters were male and the personal information and how long she'll be gone; kids' photos had previously been then use it to fleece users, say names and schools; favorite rated average for researchers at the University sports teams, entertainment attractiveness." of Buffalo. Whereas Facebook venues and online shopping Study subjects were 150 recently manipulated users' sites; church of choice, Facebook users recruited emotional states in service to favorite charities and what a from the UB student body. In an online study, phishers person funds on Kickstarter; stage i of the attack, each exploit people by using the and so on and on. subject was sent a friend emotional influence of others Using this information, it is request from one of the in their social netwo.ks, easy to learn someone's Facebook accounts. "One in "Farcing" is what researchers phone number and email five subjects OK'd the call it, and it's on the rise. address -- maybe even salary fictional farcer's initial friend The attack may not end and account numbers, request, thus falling victim to with the user, however. Once Multiply those data by 50 (the the first stage of the attack," the phisher friends a user, number of a user's real online Vishwanath says. each of the user's friends may friends) and then by their "While a farcing attack receive a request and think 2,500 friends (at 50 each) and could stop at this point and the phisher is a real person -- it is clear that sneaking into use just the information a "friend's friend." In this an account can be quite already made available to way, such attacks become lucrative, him-- including the victims' virulent in a very short time "This is how the Hollywood friend list," he says, "a through a-process of upward 'bling ring' operated," motivated phisher can go on contagion, in which the Vishwanath says. "The to the second stage, phisher steals information scammers used information requesting more information from a person's real online freely provided through directly from the victim by friends, then their online social media profiles, updates using messaging functions friends, and so on. and tweets to locate addresses within the social media These findings are of celebrities, find out if they platform. Messages can be published in a new study by were home and rob them." crafted to take advantage of Arun "Vish" Vishwanath, Another farcing case, which the asymmetries between the University of Buffalo was attributed to espionage information mined from the associate professor of by the Chinese government, victim's page and the communication. The study tricked senior military deceptive intent of the appears in an upcoming issue officials from the U.K. and phisher." of the journal Information U.S. into becoming Facebook Vishwanath offers the Systems Frontiers. It is friends with a fictional U.S. example of a well-publicized currently online. Navy admiral, he says. "The farcing attack that took place "Farcing takes place on phishers then collected a good recently in a school district popular social media deal of information about the near Buffalo. A substitute platforms like Facebook, officials from their profile teacher created a false Twitter, LinkedIn and Google pages and posts." identity and fake Facebook Plus," says Vishwanath, "and profile in which he presented has been used for online The experiment himself as a female student. bullying, identity theft, To ascertain how the He used that identity to entice organizational espionage, phisher hooks a victim; learn minors-- some of whom were child pornography and even how many victims, once his students-- to send him burglary." One way to protect ensnared, are likely to explicit sexual photographs. oneself, he says, is to be much continue to provide He is now Serving 30 years in more careful when making information to the invader;, prison. friending decisions -- phony, and determine the'extent of In this study, a further 13 even felonious, characters the danger posed by farcing to percent of subjects who will present themselves as the social media marketplace, befriended the phisher great new friend possibilities. Vishwanath set up a responded to his message Another is to limit the simulated farcing experiment requesting additional amount and types of personal on Facebook and watched it personal information. information shared on social unfurl. Although at the study's end, media sites. "We established four fake 46 percent of the original 30 "These scams are on the characters with Facebook who had befriended him had rise and will continue to profiles for the study: one decided not to provide increase with the popularity without a photo or friend additional information, 41 of social media, exponentially connections, one with a photo percent were still considering increasing the number of but no friends listed, one with the request. farcing victims worldwide," he says. , Summer 2014 Imagine the wealth of information available to an f'BB online "friend," the phisher: a person's name, nicknames and the names of friends and relatives; schools and Eyenj Ib{otufaj/ 9vht 5-Sprn* June 30-Sept 15t August 18 h Featuring Tyler Stafford "Locag, Fresh & Delicious" , Breaft & Lunch Wed-Sat {i Mon BBQ Sunday Brunch Private Parties & Catering Available 530-836-1619 190 Bonta Street, Blairsden I Meadow Valley Schoolhouse 4 Sunday, August 1 7, from 3:00 p.m. to 6:00 p.m. Please join us for an afternoon of history about this Wonderful landmark. Public is Welcome! Contact Donna McElroy at 530-283-2896 for more information. Donations can be sent to the Meadow Valley Schoolhouse P.O. Box 130 Meadow Valley, CA 95956 i ! Paint free ! Granite boulders at Indian Rocks day-usearea at Bucks Lake show no traces of paint one I week after teenagers splattered them with paintballs. The day after a July 30 newspaper I report about the incident, Plumas National Forest Mr. Hough District Ranger Mike Donald. dispatched a crew to wash the rocks. This photo was taken Aug. 2. "Hopefully it is even better after these recent days of rains," Donald said. Photo courtesy Mike Donald Racing ofCalfforma Re i! California Governor Brown has declared a drought State of Emergency on January 17, 2014, and called upon all Californians to do their part to reduce their water usage. The State Water Resources Control Board is now requiring all water suppliers to institute mandatory water conservation. A District our size must either restrict outdoor watering to two days per week OR institute other mandatory conservation measures. At this time, Quincy Community Services District has elected to institute other mandatory conservation measures with the hope that we will achieve sufficient reduction and not have to institute further restrictions. In 2012, Quincy CSD began our voluntary alternate watering days to begin conserving water. In accordance with the State requirements, effective immediately, the voluntary alternate watering days are mandatory. If the last number in your address is even (0, 2, 4, 6, 8), water only on Tuesdays, Thursdays and Saturdays. If the last number is odd (1, 3, 5, 7, 9), water on Wednesdays, Fridays and Sundays. There is no watering on Mondays. The regulations adopted by the State Water Resources Board further restrict the following activities: No Excessive irrigation: Irrigating in a manner that causes or allows potable water to run off property onto sidewalks, gutters, streets, ditches, or storm drains is prohibited. No Landscape Watering between Noon and 6 p.m. No use of a hose to wash an automobile unless the hose is fitted with a shut-off nozzle. No Washing down Hard or Paved Surfaces. Customers may not wash down sidewalks, walkways, driveways, parking lots, patios or other paved surfaces, except to alleviate immediate safety or sanitation hazards or to prepare paved surfaces for sealing. We appreciate your assistance and cooperation. Please call our office if you have any further questions. Thank you! Phone: 530-283-0836 Fax: 530-283-0838 Quincy Community Services District 900 Spanish Creek Road Quincy, CA 95971 Save 0[r { 1