This woman appears to be under 30, but claims to have been in the corporate grind since 1996. In addition, her photo, and her similar connections, are all using stock photos as their profile pictures. Image courtesy of the author.

Screen Shot 2016-01-11 at 3.52.39 PM

Over the past year, SOFREP has drawn the attention of an increasing number of incidents involving falsified social media and email accounts targeting the writers. Albeit this is not an organic issues, as the use of subversive profiles for intelligence gathering and disinformation purposes is an ever-growing trend.

If you connect with a fake account, you risk exposing sensitive personal details. Foreign and illicit organizations are actively seeking out your sensitive details and want to map your network, collect pictures, phone numbers, email addresses, and information about where you live, work and play. Currently Chinese and Russian spies are said to be the primary users of this methodology. Although additional governments and criminals have adapted this approach for their own nefarious means.

Recently SOFREPs’ own, Jack Murphy, was the target of Russian intelligence services via deceptive email practices. The agent who was operating behind a masked internet protocol address, while attempting to establish the personality of an attractive woman – attempted to bait Jack with some well-packaged information. The info turned out to be nothing more than slanted pro-Russian propaganda, and the plot was uncovered before any real-time was dedicated to the attempted deception. 

Chinese spies performed a high-level example in 2013. The spies executed a modest yet devious plan, simply by creating a counterfeit Facebook profile in NATO’s, Supreme Allied Commander James Stavridis’ name. On name recognition alone, they were able to connection with senior NATO member-nation military officers and defense staff and their families.

Lighter attempts take place on a daily basis, and these can identified by the simple discrepancies in the requesting person’s profile. For instance, their profile is relatively new. The requester may have very few or mismatched connections – which is often the result of a bulk requesting campaign on their behalf to establish legitimacy. If there is any use of stock photos, as an attempt to pass as a real person – that is a red flag. You should also spot-check the information they provide for any inconsistencies or relevance, as to why they should be your connection. This is the internet after all; you have no idea who is really on the other side of your screen. 

Screen Shot 2016-01-11 at 3.52.51 PM
A recent deceptive request, note the stock photos. The profile pictured was deleted prior to the publication of this article. Image courtesy of the author.

You should not be surprised if a connection, is a recent connection of the requesting person, or even if they have received their endorsements, simply watch, and wait. If it seems fake; it probably is. In fact, if you are not sure, let their request sit in limbo, as many false profiles disappear in a relatively short amount of time. This will also provide you with the opportunity to monitor them, and make your determination based off their actions.