Tag Archives: social media

Navy Warns Marines And Sailors Of “Card Cracking” Scam

Standard
(tuan_azizi/iStock/Getty Images Plus)

NAVY TIMES

The Naval Criminal Investigative Service is seeing an uptick in reports from sailors and Marines who have been duped in a card-cracking scam on social media — in some cases after being promised money as a gesture of gratitude for their military service.

____________________________________________________________________________

“The scammers are reaching out to service members through several different ways, NCIS warned.

In some cases, service members are receiving friend requests on Facebook from someone with mutual friends. The scammer then tells the service members they would like to offer them grant money to thank them for their service, or offer them money for their “debt relief.”

Another trend NCIS has witnessed is scammers connecting with service members on social media through either posts or messages, all under the guise of being a debt consolidator or business owner.

Regardless of initial contact, scammers then ask service members to share their bank login information, along with some of the security question prompts that appear on their online bank account.

“Victims have reported that after the money is deposited directly into their accounts, the scammer then asks the victim to send a portion of the money via wire or cash to a third party,” NCIS said in a recent news release.

“Victims then discover that loans have been opened in their name with the same financial institution. Any attempts to further contact the scammer are unsuccessful, leaving the victim to pay off the loan.”

These scams have resulted in “severe financial losses” for service members, NCIS said.

NCIS provided a series of recommendations to sailors, such as halting continued contact with the scammer, alerting their banks or financial institutions to lock accounts, and looking into a credit lock through credit bureaus like Equifax.

Likewise, NCIS recommended sailors inform their commands, the NCIS office, and also law enforcement authorities, and advised against sharing bank login details with anyone.

Although NCIS warned sailors last month to be aware of COVID-19-related schemes, the agency initially said it did not believe these card-cracking scams are connected to the pandemic because there had already been a rise in scams over the past year.

However, NCIS told Military Times it received an image Thursday afternoon of a scam circulating via email targeting Navy Federal Credit Union members that offered to assist them with $800 for COVID-19 relief. The email requested members to validate their Navy Federal customer data in order for the funds to clear.

“We urge the Department of the Navy family to remain vigilant of scams offering promises getting out of debt and making extra money, especially during this challenging time for our nation,” NCIS spokesman Jeff Houston said in an email to Military Times.

Service members have frequently fallen prey to scammers and lost millions of dollars as a result.

According to a December report analyzing data from the Federal Trade Commission and Better Business Bureau, active duty personnel and veterans from the Navy have been tied up in 143,718 scams totaling $62,542,897 since 2012. Those from the Marine Corps have also been involved in 57,204 scams totaling $24,976,528.”

https://www.navytimes.com/news/your-navy/2020/04/09/beware-of-thank-you-for-your-service-money-scams-ncis-warns-sailors-and-marines/

Understanding The Challenge Of Short Attention Spans

Standard
Image – “Linked In” – Bristin Appukuttan

WASHINGTON TECHNOLOGY” – By Mark Amtower

Next time you have something to share, people are likely to remember that you make your point quickly, and they may be more likely to give you another look. Violate that by boring them with verbosity or rehashed ideas and you are toast.

_________________________________________________________________________

“From 1989 to 1995, HBO presciently produced a comedy that predicted a phenomenon beyond our control, the ever-decreasing attention span. The show, Short Attention Span Theatre, soon become known as SAST (representing yet another growing phenomena- the acronymization of our language…talk about a short attention span).

As one might surmise from the name, SAST was a series of short skits and interviews, many of which were LOL (sic) hilarious. Among the hosts was a rising comedic star, Jon Stewart. This was eminently watchable TV for the simple reason that things happened quickly, and if you only had a few minutes to spare, you could watch, laugh, and move on without fear of missing a plot twist. Look it up on YouTube- it stands the test of time

I did a little research on attention spans recently and found that some people’s attention spans were now under ten seconds. TEN seconds.

Our attention spans are getting shorter. I won’t speculate as to why except to say that with the various technologies available the craving for instant gratification continues to outdistance our desire for deeper understanding. I’d blame Gordon Moore (see below), but he was simply pointing out the obvious.

Not only are attention spans getting shorter, but the majority of people are multi-tasking, especially the younger ones, which further reduces the attention given to each task.

So now we get to the crux of this matter: in marketing “content is king.” Companies seeking to grow marketshare have an ever-increasing need to put content into the hands of people who make buying decisions. Unfortunately, it’s likely that their audience lacks the time to consume the tons of daily content that’s coming at them from multiple directions.

And, like most, they probably have a shrinking attention span.

So, we have the collision of short attention spans with the desire to get the attention of decision makers, an audience that may or may not pay attention to your content even if it crosses their screen or even lands in their inbox.

Add to this the fact that content is being produced and shared at a breakneck pace. Think of this as Moore’s Law(1) where computing speed is replaced by the amount of content being generated, and instead of doubling every two years (Moore’s original concept), now it takes maybe a couple of months to double the amount of content being generated. As Moore implied, this is not a reversible condition.

With this addition to our “content is king” premise, how do we get the attention of the audience we seek?

Many marketers understand that being concise is key. I call it the word-per-idea ratio (2) where you strive to keep the ratio as tight as possible while retaining the ability to convey a concept. This is why many business videos, podcasts and blog posts are short. It is why I try to keep most of my articles and blog posts to under 500 words. Make one good point and make it fast. Next time you have something to share, people are likely to remember that you make your point quickly, and they may be more likely to give you another look.

Violate that by boring them with verbosity or rehashed ideas and you are toast.

The biggest problem is getting your content in the queue of the decision makers, and this is never a given. Even if it gets in the queue, a variation of Heisenberg’s uncertainty principle(3) occurs: the timing– will it be found and read or will it miss being seen because it was not delivered in the venue (LinkedIn, Facebook, Twitter, etc.) when your prospect was present?

Short attention spans + so much content + timing issues = black hole absorbing unseen content.

There is no simple solution to this puzzle. However there are ways to increase the odds in your favor, including

  • Try to produce good content that is germane to your audience
  • Only one main idea per piece of content
  • Use a compelling headline or title that highlights the topic you will discuss
  • In written pieces, use graphics
  • Cite original sources as necessary and when you can link to those original sources
  • Hashtag people and companies mentioned
  • Re-purpose the content into multiple formats
  • Place the content in venues where it will most likely find the right audience
  • Place it in those venues more than once (retweeting is great, posting on LinkedIn in different places should work)
  • Send it directly to those you really need to reach IF you have a relationship with them
  • Generate content on a regular basis, not on rare occasion
  • Make certain the content is edited for clarity and grammar
  • Ask viewers and readers to share (“If you liked this, please share it with those who might find it useful.”)
  • Care and feeding of regular viewers/commenters – comment back on comments and remember to say thank you
  • All of your content (or links to it) should be in one location on your web site

Is this too much to keep in mind when producing content? Initially, yes, but most of it becomes muscle memory with practice.

If and when I come up with a more practical solution, I’ll call it Amtower’s Content Marketing Law.

AND, if you like this article, please share it….

This article is an expanded update of: https://www.linkedin.com/pulse/sast-meets-content-marketing-when-heisenberg-collides-mark-amtower/

(1) Moore’s law: IT executive Gordon Moore wrote in 1965 that the speed of computing would double every two years predicated on the number of transistors a microchip can hold.

(2) I first heard the phrase “word per idea ratio” from Chris Trelease, then with telemarketing firm Sturner and Klein. I worked there while in graduate school and a short time beyond that, and I met and worked with some great people.

(3) Uncertainty principle, also called Heisenberg uncertainty principle or indeterminacy principle, statement, articulated (1927) by the German physicist Werner Heisenberg, that the position and the velocity of an object cannot both be measured exactly, at the same time, even in theory.”

https://washingtontechnology.com/articles/2020/03/11/insight-amtower-content-overload.aspx

ABOUT THE AUTHOR:

Mark Amtower
Mark Amtower

Mark Amtower advises government contractors on all facets of business-to-government (B2G) marketing and leveraging LinkedIn. Find Mark on LinkedIn at http://www.linkedin.com/in/markamtower.

Why Social Selling Matters In Government Contracting

Standard
Image: Super Office.com https://www.superoffice.com/blog/social-selling-statistics/

“WASHINGTON TECHNOLOGY” By Mark Amtower

“Social selling occurs online in social networks, especially LinkedIn. It is not a “close the deal” scenario. Social selling is an adjunct process that helps open doors and keep them open. “

______________________________________________________________________________

“One of the more recurrent complaints when a company is making the “go/no go” decision on a bid is “we’ll lose because the client does not know us.”

I heard Bob Davis say this the first time I saw him speak in the early 1990s and I’ve heard it hundreds of times since, especially when I speak at the APMP-NCA fall conference. If this is a common refrain for proposal professionals, it’s got to be an issue across the board.

Enter LinkedIn and social selling.

Social what? Social selling is the process of getting on the radar of specific niches within the market you serve and staying there in a non-intrusive way, adding value by sharing content, making intelligent comments on group posts, viewing profiles of influencers, reaching out to your first degree connections occasionally, and reaching out to connect with new people when the time is right.What social selling is not is traditional selling.

What social selling is not is traditional selling.

Demonstrating thought leadership and subject matter expertise requires a LinkedIn profile that shows that expertise. LinkedIn also provides a content sharing platform to demonstrate thought leadership.

You can identify most of your government customers on LinkedIn, and while you may not be able to manage them, you can keep them informed on what your company is doing.

LinkedIn provides a platform to demonstrate your points of differentiation. Indeed, those points of differentiation often substantiate your thought leadership position.

Capturing and managing customer data is also a function of LinkedIn. You can see where your prospect/customer has worked previously, how long they’ve been in their current position, and more. This should be helpful when prepping for a sales call.

Lead generation can start with looking up the client organization as a company on LinkedIn and using the appropriate search filters to find key people. All Federal agencies and operating divisions have company pages.

Business development and sales staff should be doing all of the above to enhance their other BD and sales activities.

Moving leads and prospects through the sales funnel starts with the above activity, and then you connect with key influencers and add them to your network.

A few other things social selling can help you with include

  • Account/agency based marketing efforts
  • Establishing and reinforcing your brand
  • Building those oh-so-important relationships

Done well, social selling strengthens the relationship between sales and marketing and makes each more effective.

Social selling may not be traditional selling, but in GovCon, it can take you a long way toward your goals.

Engage with social selling and you can kiss the “the client does not know us” syndrome goodbye.”

https://washingtontechnology.com/articles/2019/02/07/insights-amtower-social-selling.aspx

Mark Amtower

About the Author

Mark Amtower advises government contractors on all facets of business-to-government (B2G) marketing and leveraging LinkedIn. Find Mark on LinkedIn at http://www.linkedin.com/in/markamtower. 

“Like” War – The Weaponization of Social Media

Standard

Social media icons internet mobile phone application

Art:  istock

“NATIONAL DEFENSE MAGAZINE”

“A comparatively tiny physical conflict, fought in an area the size of Portland, Oregon, became a global engagement, prompting the exchange of more than 10 million heated messages on Twitter alone.

The lesson was clear: Not only did modern war require a well-planned military campaign. It required a viral marketing campaign as well… “


“The following is an excerpt from the new book LikeWar: The Weaponization of Social Media and reprinted with the permission of Houghton Mifflin Harcourt. 

To many Palestinians who live in Gaza City, Ahmed al-Jabari was a hero: the commander of Hamas, the militant wing of resistance to the Israeli occupation. To Israelis, he was a villain: a terrorist who exploded bombs on packed school buses and rained mortar shells down on cities. But most of all, Jabari was a survivor. He’d lived through five assassination attempts and boasted that he no longer feared bullets or bombs.

His reckoning came on November 14, 2012, as Jabari and his bodyguard were driving down a residential street in Gaza City. High above them, an Israeli Heron drone loitered. Its high-powered camera zoomed in as Jabari’s car sped past a packed minibus and onto a stretch of open road. Then the drone fired a missile.

Jabari never saw the explosion that ended his life, but millions of other people did. Even as his body smoldered, the IDF’s official Twitter account spun into action. “The IDF has begun a widespreadcampaign on terror sites & operatives in the #Gaza Strip,” declared @IDFSpokesperson. Then came an infographic that listed Jabari’s crimes in bullet points, with a big red box reading “ELIMINATED” slapped across his glowering face. After that came the YouTube clip. “In case you missed it—VIDEO—IDF Pinpoint Strike on Ahmed Jabari, Head of #Hamas Military Wing.” You could watch Jabari’s car trundling down the street before it exploded in a ball of fire. You could watch him die as many times as you wanted (the video has since been viewed nearly 5 million times) and share it with all your friends.

Within a few hours, IDF aircraft had destroyed dozens of missile caches hidden across Gaza City. “We recommend that no Hamas operatives, whether low level or senior leaders, show their faces above ground in the days ahead,” @IDFSpokesperson taunted. The challenge didn’t go unanswered. “Our blessed hands will reach your leaders and soldiers wherever they are,” a Hamas spokesperson, @AlqassamBrigade, fired back. “(You Opened Hell Gates On Yourselves.)”

The Israelis called it Operation Pillar of Defense. IDF air strikes perforated the buildings in which suspected Hamas fighters gathered, killing militants and innocent families alike. Hamas fighters responded with hundreds of unguided rockets, eager to kill any Israeli they could. Few reached their targets. Israel had a new, U.S.-provided trump card, the Iron Dome, a missile shield that could intercept the projectiles in midair. The result was an eight-day, one-sided campaign. The IDF hit every intended target; Hamas, almost none. Two IDF soldiers and four Israeli civilians were killed, and another 20 Israelis were wounded. On the Palestinian side, roughly 100 militants and 105 civilians were killed, and another thousand were wounded.

But this wasn’t the only fight that counted. There were now three fronts at work in the conflict, Israel’s chief information officer explained. Two were predictable: the “physical” fight, which Israel easily dominated, and the “cyber” fight, in which the IDF just as easily beat back the efforts of Palestinian hackers. But there was a third front, he said, “the world of social networks.” This front would prove more troublesome, and impossible to contain, soon seeping into every corner of the internet.

The IDF deployed a Twitter account, Facebook pages in multiple languages, Tumblr blog pages, and even a Pinterest page. There were slick infographics and a stream of videos and statistics.

Maximizing follower engagement, the official IDF blog offered small digital rewards for repeat users. Visiting the blog ten times got you a “Consistent” badge; searching the website got you recognized as a “Research Officer.” Memes were fired off in volleys and tested for engagement, the best ones deployed extensively. The IDF’s most widely shared image showed Hamas rockets bearing down on cartoon versions of Sydney, New York, London, and Paris. “What Would You Do?” the caption asked in bold red letters.

By contrast, the propaganda efforts of Hamas’s militants were less structured. Most of its social media response came from millions of unaffiliated observers around the world, who watched the plight of Palestinian civilians with horror and joined the fray. The Twitter hashtag #GazaUnderFire became an unending stream of images of atrocities: bombed-out buildings, dead children, crying fathers.

The scourge of war left nothing untouched —including video games and fast-food chains. The IDF hijacked the hashtags for the World Cup, a new James Bond movie, and even the same Call of Duty franchise that Junaid Hussain would weave into his own recruiting (“Playing war games on Call of Duty last night? Over a million Israelis are still under REAL fire#BlackOps2”). Meanwhile, pro-Hamas hackers took over the Israeli Facebook page of Domino’s Pizza, using the opportunity to threaten a merciless reprisal of “more than 2000 rockets” against Israeli cities. When Domino’s regained control of the account, it had a message of its own: “You cannot defeat . . . the Israeli hunger for pizza!”

Even as the missiles flew, the IDF and Hamas continued to narrate the conflict, each posting nearly 300 messages: alerts, updates, and a steady string of taunts. “Warning to reporters in Gaza,” wrote @IDFSpokesperson. “Stay away from Hamas operatives and facilities. Hamas, a terrorist group, will use you as human shields.” @AlqassamBrigade couldn’t let this stand. “Stay away from Israeli IDF,” the Hamas spokesperson mimicked. “We are just targeting Israeli soldiers, fighter jets, tanks and bases.” It was a remarkably juvenile exchange. But these taunts couldn’t be dismissed as easily as the ones you might hear in a kindergarten classroom. After all, they were salvos lobbed by two combatants in a real, shooting war.

There was a temptation, after the sides had settled into an uneasy cease-fire, to dismiss this weird internet flame war as a bunch of digital noise. After all, the angriest tweets were still just tweets — literally, “short bursts of inconsequential information.” But that would have been a mistake. Years after Operation Pillar of Defense had slipped from the public mind, American University professor Thomas Zeitzoff conducted a painstaking study of hundreds of thousands of tweets, which he then mapped across each hour of the physical side of the eight-day conflict.

What he found was shocking. In the case of Israel, a sudden spike in online sympathy for Hamas more than halved the pace of Israeli air strikes and a similarly sized leap in Israel’s own propaganda efforts. If you charted the sentiment (pro-Israel or pro-Palestine) of these tweets on a timeline, not only could you infer what was happening on the ground, but you also could predict what Israel would do next. IDF commanders hadn’t just been poring over battlefield maps. They’d also been keeping an eye on their Twitter feeds — the battlefield of the social network war.

Taking place in 2012, Operation Pillar of Defense offered a glimpse of an emerging way of warfare. It was a conflict in which each side had organized to taunt and troll each other online, even as they engaged in a life-and-death struggle in the real world. Their battles drew in millions more international fighters. Some were passionate supporters of one side; others had just stumbled upon the war while looking for video game news or pizza. They shaped the fight all the same, strengthening the voice of one faction or another — and, by tiny degrees, altering the course of events on the ground.”

http://www.nationaldefensemagazine.org/articles/2018/10/15/book-excerpt-likewar-the-weaponization-of-social-media

 

 

Pentagon Needs Help to Combat Social Media Threats

Standard

 

 

Getty may17-GD-socialmedia

Image:  Getty 

“NATIONAL DEFENSE MAGAZINE”

“The Defense Department must work with Silicon Valley on ways to deter the growing weaponization of social media by state and non-state actors.

Tech companies in Silicon Valley should work with the Defense Department on these challenges by helping to identify, detect and disseminate information being spread over social media.

The United States has been slow to invest in areas such as data processing and analysis tools that could help war fighters counteract online recruitment to violent extremist groups and state efforts to spread disinformation and propaganda online, said Adam Sharp, former head of news for government elections at Twitter, during a recent conference hosted by New America, a Washington, D.C.-based think tank.

President Donald Trump’s recently announced “skinny” budget significantly increases funding for the military, but is “disproportionately focused on more traditional war-fighting, and not on … figuring out how to maintain the U.S.’ edge in these information processes,” he said.

Social networks and internet applications including Facebook and Twitter have become woven into battlefield operations and are “a driving force” in national elections, including the United States’ 2016 presidential election, said Peter Singer, strategist and senior fellow at New America.

The first battle to reclaim the Iraqi city of Mosul from the Islamic State, or ISIS, was kicked off with a Twitter hashtag, #AllEyesOnISIS, “like a new movie or a video game,” he noted.

The Defense Department needs to update its training environments to face the challenges that accompany the increasing pace and volume of information that is spread online, he said.

The motives for spreading disinformation to benefit state actors and recruiting individuals to violent extremist groups are not new, but the appearance of digital armies who can help plant and spread information with specific narratives has become a global issue, said Yasmin Green, director of research and development at Jigsaw, a technology incubator created by Google.

“Information warfare has been around since the beginning of media. … [But] because of the challenge of attribution [online], there isn’t really a doctrine around a proportional response,” she said. “There’s no form of deterrence here.”

http://www.nationaldefensemagazine.org/articles/2017/4/25/help-wanted-to-combat-social-media-threats

 

 

Social Media on the Front Lines of War

Standard

New Zealand IsiLTerrorist Accidentally Tweets Location from Syria

New Zealand IsiLTerrorist Accidentally Tweets Location from Syria

“FOREIGN POLICY ASSOCIATION”

“Social media started out as a technological innovation but has become a social phenomenon.

Intelligence agencies appreciate the importance of social media and its role.

In a recent PBS Newshour interview, Nick Rasmussen, of the National Counter-Terrorism Center (NCTC) just outside Washington DC, explained how, in the context of searching for a terrorist threat, “increasingly what ‘connecting the dots’ means to me is dealing with the huge volume of publicly available information. The work we’re doing now often doesn’t involve really sensitive intelligence; it involves looking at Twitter, or some other social media platform, and trying to figure out who that individual is behind the screen name.”

Since the early 2000s Facebook has become indispensable for families and friends to stay in touch, and people and organizations with large numbers of Twitter followers are able to carve out virtual mini-media empires. Clicks and ‘follows’ are the new version of voting with your feet. The more readers or followers one has, goes the logic, the more influence one wields.

To turn it around, people who actively use social media for every day, non-political reasons are also subject to being targeted.

One of the vulnerabilities (or advantages, to a combatant wishing to recruit people) is that social media accounts usually expose users to invasive scrutiny. Facebook and LinkedIn profiles can carry enough information that, shared with the wrong person, can be used to compromise that person or uncover confidential information about his/her job. Many countries’ military members are now routinely required to not specify their location or activities.

As the years passed of the conflicts in Iraq and Afghanistan, jihadi groups increasingly began to recruit through social media. Stories now abound of young adults of Middle Eastern heritage and origin, living in western Europe and the US, who have been contacted by Islamic State through social media and convinced to move to Raqqa, the Islamic State’s purported capital. Some 60 young women from the UK, aged 20 and below, are thought in the past several years to have traveled to Raqqa.

The huge growth in cell phone cameras and the ease of posting pictures to social media has also played a role in tracking and finding various targets. Of recent note, investigative organizations were able to track operatives and military equipment in eastern Ukraine primarily through personal pictures posted to social media and publically available imaging, including open source tracking of the apparent missile launcher used to destroy Malaysian Airlines flight 17 in 2014. This has also been a method to discover the location of various actors in the labyrinthine war in Syria.

Per the previously mentioned PBS Newshour article, many Islamic State fighters simply do not disable the geo-location feature on their phones, which allows those with the right technology to track them.

Intelligence agencies of major world powers now seem to appreciate the importance of social media and its role in ‘information operations,’ a military term that infers the ability of messaging to affect the viewpoints of a target population. Just looking through listings for ‘intelligence analyst’ on several Washington DC—based job boards, foreign language specialists are widely sought for social media and social networking positions.

Of course, it is not only parties to the worlds’ trouble regions that are looking to abuse social media to their advantage. For even a longer time, social engineers and hackers have tried to gather personal information by establishing links online.

If you are uncertain about that LinkedIn invitation you just got, try to verify the person through a known contact. If you are doubtful, ‘ignore’ or ‘delete’ works just fine. If he or she happens to be a colleague whom you meet at the next social, you can safely add them, and actually have a face-to-face conversation, something social media, unfortunately, seems to increasingly discourage.”

Social Media Now on Conflicts’ Front Lines

 

 

 

What Small Businesses Must Know About Next-Generation Marketing

Standard

teadata.com.net

Image: teradata.com

“HUFFINGTON POST”

“To compete successfully, small businesses need to achieve five marketing musts:

  • Build a website that works well on both desktops and mobile devices
  • Claim directory listings on sites like Google Maps and Yelp
  • Secure positive online reviews from customers
  • Establish a social media presence
  • Stay engaged with existing customers

Consider these startling statistics:

  • Half of small companies do not even have a website, according to a study we commissioned with Research Now.
  • Ninety percent of small businesses have not optimized their site for mobile, according to the same research.
  • While 78% of consumers’ purchases are influenced by online reviews per a survey by Ipsos Open Thinking Exchange, 87% of small business owners do not ask their customers for reviews, according to other research we commissioned.

The good news for small businesses is that next-generation marketing tools tailored for them have been evolving quickly to keep pace with changing consumer behavior. The best ones for businesses are not DIY (“do it yourself”) but instead have a blend of a DIFM (“do it for me”) and DIWM (“do it with me”) approach. This enables local businesses to have the starting point for an online presence set up for them – the basics like a website and directory listings – while getting support in higher investment activities like, for example, securing and syndicating online reviews.

Our bet is that the best solutions for small businesses will come from the providers that spot these gaps in the marketplace and address them. Small business owners need a solution that will use technology seamlessly to deliver the right message to the right consumer at the right time. That will make it a lot easier for small businesses to play in the big leagues, no matter what their budget.”

http://www.huffingtonpost.com/court-cunningham/what-small-businesses-mus_b_7465038.html?utm_hp_ref=what-is-working-small-businesses

Facebook Won’t Stop Experimenting on You. It’s Just Too Lucrative

Standard

Image:  Linked In

This is where profit motives and government cross paths. I find this article a bit disturbing knowing the NSA has a direct feed from Facebook.

“WIRED”

“If anything in recent memory comes close to validating off-repeated conspiracy theories about the motives of Facebook, it was the company’s now infamous “emotional contagion” study published over the summer. In the study, Facebook researchers tweaked the News Feeds of nearly 700,000 users—without their knowledge—to see if more positive or negative updates from friends induced the same emotions in the users themselves.

The outcry was swift and loud, and now, several months later, Facebook says it’s being more careful in how it conducts its research. But there’s no sign that it’s stopping.

The idea that Facebook isn’t a content-neutral communication medium like the phone or email seems to generate constant surprise and outrage.

In a blog post Thursday, Facebook Chief Technology Officer Mike Schroepfer acknowledged missteps in the emotional contagion study. “We were unprepared for the reaction the paper received when it was published and have taken to heart the comments and criticism,” he wrote. “It is clear now that there are things we should have done differently.”

Schroepfer said Facebook should have considered other ways to do the study, and that the research should have been vetted more carefully by more and higher-ranking people. Over the past three months, Facebook has put clearer research guidelines into place along with a more thorough review process and more training, Schroepfer said.

But nowhere did he say that Facebook plans to stop experimenting on users. On the contrary, by setting up a system to undertake research more carefully, Facebook is giving itself cover to conduct more such research. All of which should come as a surprise to exactly no one.

Not Evil, Just Business

That’s not because Facebook is somehow evil, but because Facebook is a business—albeit a business that is perpetually misunderstood. The idea that Facebook isn’t a content-neutral communication medium like the phone or email seems to generate constant surprise and outrage. To be fair to the outraged, Facebook doesn’t go out of its way to remind users that the News Feed is gamed, and it specifically does not reveal how it is gamed.

So we’ll spell it out: Facebook has every reason to manipulate the News Feed to optimize for whatever user engagement metrics correspond to the best returns for advertisers, which in turn correspond to the best returns for Facebook. And it has every reason to use other experiments in an effort to improve other parts of its operation. This is the way so many online companies work.

“Facebook does research in a variety of fields, from systems infrastructure to user experience to artificial intelligence to social science,” Schroepfer said. “We do this work to understand what we should build and how we should build it, with the goal of improving the products and services we make available each day.”

by setting up a system to undertake research more carefully, Facebook is giving itself cover to conduct more such research. All of which should come as a surprise to exactly no one.

These efforts are particularly valuable to Facebook because the reach of its service is so large. It has nearly as many test subjects as China has people—a competitive advantage it’s not about to sacrifice just because its manipulations make some users uncomfortable.

Most conspicuously absent from Schroepfer’s post is any suggestion that users can opt into or out of experiments like the emotional contagion study. The lack of transparency and consent is exactly what outraged users in the first place. But it’s understandable why Facebook likely wouldn’t see traditional informed consent as an option.

Facebook’s user base gives it access to one of the largest, most revealing random samples of human behavior ever assembled. Offering users the option not to participate would undermine the quality of Facebook’s results by compromising their randomness. The reactions and behaviors of a self-selecting group that knows it’s being watched pale in value compared to 1.3 billion people un-self-consciously going about the drama of their daily lives.

Little Incentive to Change

Monitoring, manipulating, and packaging users for advertisers are among the practices that are purportedly driving 50,000 would-be users per hour to jump on the wait list for Ello, the new ad-free social network. But even if that number were in the millions, Facebook would have little incentive to do things differently.

A few weeks after the emotional contagion scandal erupted in late June, Facebook reported record revenues and profits for its most recent quarter, and expectations are high that this quarter Facebook will once again top itself. One user behavior Facebook would no doubt have little trouble measuring is whether news of its maligned research project correlated with an uptick in defections from the service or a drop in logins. If it had, Facebook might be expected to do something more drastic to curb such projects in the future.

But however more careful Facebook promises to be, its experiments aren’t going away. “We believe in research, because it helps us build a better Facebook,” Schroepfer wrote. And judging by Facebook’s bottom line, that research seems to be working.”

http://www.wired.com/2014/10/facebook-wont-stop-experimenting-just-lucrative/