• Who We Are
  • What We Do
    • Reputation Management
    • High-Stakes Issues
    • Digital & Innovation
    • Experience
  • Interviews
  • News
  • Connect
The Torrenzano Group | Public Relations & Strategic Communications Firm
  • Who We Are
  • What We Do
    • Reputation Management
    • High-Stakes Issues
    • Digital & Innovation
    • Experience
  • Interviews
  • News
  • Connect

​News

Torrenzano professionals are often called on by media to comment on issues of national importance. Following are select observations:​
​  

Manufacturing Leadership Journal Features Torrenzano & Digital Assassination Co-Author

12/12/2014

0 Comments

 
Picture
Beware The Digital Assassin

Personal and corporate reputations are increasingly vulnerable to online attacks that often ruin lives and businesses. A book by two leading reputation management advisors explains how “digital assassins” attack, and what you can do to defend yourself.

By Sue Pelletier

Feature/ Beware the Digital Assassin

How do competitors, “black hat” hackers, deter­mined promoters of special interests, personal enemies, and trolls use the Internet to destroy your company’s—or your personal—reputation? Richard Torrenzano and Mark Davis count them in their book, Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks. Torrenzano and Davis see seven basic modes of attack.

While most of these methods—which the authors call “swords”— have been around as long as humanity itself, the Internet brings a speed, scope, and permanence to the amount of damage a digital assassin can do.

Though technology has not stood still in the two years since the book was published, the ways people use it to destroy reputations are timeless. And despite better firewalls, malware sniffers, and other tech defenses, the digital assassins are as prevalent as ever. As Torrenzano said in a recent interview, “The ability to smear reputations breeds on the In­ternet. Instead of the problem get­ting smaller, it is now reaching a crisis level.” For a ripped-from-the-headlines example, one need look no further than the 2013 data breach that endangered the identities of 40 million Target customers.

“No one is safe, no one is im­mune to this,” adds Torrenzano. “Anyone who has a public profile is vulner­able to attacks on their credit and credibil­ity. Unfortunately, most people don’t think about this until it happens to them.”

Using examples that range from ancient Rome to recent headlines, Torrenzano and Davis explain in terrifying detail why you need to understand the digital deviltry that exists to terrorize your business and ruin your personal reputation, as well as the sev­en “shields” you can use for protection.

Slash and Tell

Among the seven swords are two the authors call New Media Mayhem and Silent Slashers.

New Media Mayhem—Everything old is new again, with a twist, especially when it comes to media. “This new global media environ­ment oddly takes us back to the level of a dis­graced inhabitant of a small village of a prior era, condemned for life by gossip,” say the authors. While 20th-century media at least attempted to provide fair and bal­anced reporting of news, in today’s Google-centric news environment, what rises to the top of the search page isn’t necessarily the best cov­erage, but the most sensational. “More dirt means more eyeballs, which means more ad revenue,” the authors say.

Traditional media, while still a force, is be­ing replaced by “the clowns and barking seals of a digital circus,” say the authors. Today, corporate systems are open to hacking, there are “sticky” negative images that “spread like kudzu in a Google environment,” and non-governmental organizations collude with se­cret donors, media, and prosecutors to bring down high-profile targets.

Even attempting to fight back can back­fire, as entertainer Barbra Streisand found out when she sued to keep an environmen­tal activist and Pictopia.com from posting aerial pictures of her mansion. The authors explain that the ensuing publicity drew mil­lions to view the photo on the once-obscure site, and “the picture wafted all across the In­ternet, like so many dandelion seeds, into too many places to monitor or count.” Attempts at suppressing an image now often leads to its promotion on the Internet—a phenom­enon now known as the “Streisand Effect.”

There is no shortage of “Gossip Girls”— think sensation-sellers such as TMZ and Perez Hilton—who are willing to pile on to anything that sounds salacious with no regard to what’s fair. And don’t forget the “Shame Famers” looking for attention any way they can get it, even if it comes at the price of outing themselves as being in­volved in the scandal.

Even corporate competitors are taking off their digital kid gloves. “Indeed, low-grade corporate warfare is constantly being waged between technology giants through patent trolls, insider blogs, and corporate talking points that accompany lobbyists thrust in front of senior congressional staff­ers and regulators,” they say. And not just tech companies are engaging in this type of battle; the authors cite examples from Jen­ny Craig to Burt’s Bees to Facebook.
Once the spin is out of the bottle, it can and will amplify across the Net, leaving tat­tered reputations in its wake, say the authors.

This is tricky to combat. The law has come down on the side of interactive com­puter services that are used to spread lies, rumors, and disinformation, saying that it is solely on the individual poster, who, of course, may be impossible to identify.

Silent Slashers—“Today the Internet em­powers digital assassins, allowing undocu­mented charges and concocted images to ping around the globe at light-speed,” the authors say. Where once pet peeves were anonymously painted on the walls in ancient Rome, today they’re equally anonymously sprayed all over online bulletin boards, so­cial media, and other technology platforms. Then Google’s spiders index them, and the more slanderous the post, the more hits it gets, the higher it reaches in search rankings, and the more viral it becomes.

These attackers are called “Silent Slash­ers” because you may not even be aware of the wound that’s been inflicted until you see it gushing all over the Internet. Again, while this type of sneak-attack character assas­sination is nothing new, “the dark arts of disinformation on the Internet have the po­tential to insinuate any falsehood, provided it is lurid enough.”

The authors also explain how Google Bombing—“which manipulates search re­sults so that a search for one person or thing ­­­leads the searcher to something satirical or defamatory”—is both a very effective Silent Slasher tool and perfectly legal. And then there’s Google Bowling, “the malicious leak­ing of praise,” which the Silent Slasher uses to push a competitor’s site up the Google ranks until Google, sniffing a rat, punishes the site by knocking it far down the list.

You can sometimes put a name to an anonymous assassin by tracing IP address­es and/or threatening legal action against the site the Slasher uses. You also can try to diffuse the effects of the slash by reducing the rumor’s importance and/or its ambigu­ity, which are the two factors that make it Internet gossip catnip. But tread very care­fully, because the more attention you bring to the rumor, the more attention it will re­ceive—you may end up inadvertently am­plifying it instead of dampening it down.

All Is Not Lost

After outlining five more ways digital assassins attack, includ­ing using “Evil Clones” to falsely represent you and “Human Flesh Search Engines” to digitally mount a real-life mob assault, the authors offer seven “shields” you can use to minimize, neutralize and even defeat attacks from those using the seven swords against you. Here are two to get you started.

  • Learn about social media and other new technology. Whether on sites like Mash­able, Wired, and Gizmodo; through a class at your local library or a lecture from your professional association; or from asking a tech-savvy someone to walk you through it, get your fingers on the keyboard and re­ally get to know the Internet. “Don’t stop until you understand—with your finger­tips—how search engines really work, how to start a blog and maintain it with an easy free software like WordPress; how to access the popular social networking services like Facebook, Tumblr, or Jaiku; how a search term can be optimized; how to use Google AdSense …You are not equipped to man­age your reputation until you can comfort­ably navigate and post and actively partici­pate on the Internet,” the authors say.
  • To respond or not to respond? “The first question that must be answered in the aftermath of an assassin’s attack is whether or not to respond at all. Like encapsulated cancers or asbestos lining old buildings, sometimes it is best to leave an ugly post alone,” the authors say, because respond­ing could end up propagating it instead in a replay of that “Streisand Effect.”

The authors add, “Ask yourself if the of­fending material is likely to have real-world negative consequences … Second, who has seen it?” Also look for who the attacker is, if the attack is going viral, and if there is an organization behind the attack.

Once you have determined if it makes sense to strike back, the authors offer a de­tailed game plan you can use to create a dig­ital defense. However, they caution, “One or none of these options may work. Even if they do, do not expect your digital profile to change overnight. The only strategy that always works in your favor 100 percent of the time is the positive approach of creating a reputational cushion.

“The only way to obtain at least some protection is to create as much positive and descriptive information about yourself, link all your sites together, and then make as many organic links as you can to others,” the authors say. They also provide very spe­cific ways to manage your reputation on to­day’s most popular platforms.

As Torrenzano says, “It’s up to you to guard your reputation. You must conduct personal and business due diligence, put safeguards in place, and monitor regularly.” 

.....................................................................................................................................

Mark Davis , a Senior Director of the Wash­ington-based White House Writers Group, has consulted with the Defence Advanced Research Projects Agency (DARPA), as well as many leading U.S. companies.

Richard Tor­renzano is the Chief Executive of The Tor­renzano Group, a New York–based strategic communications and high-stake issues management firm.

Digital Assassination is published by St. Martin’s Press of New York and is available from Amazon and Barnes & Noble.

WWW.MANUFACTURING-EXECUTIVE.COM

ME Global Leadership Community

Sue Pelletier, the Manufacturing Leadership Journal’s contributing editor, has been writing and editing business publications for more than 20 years. She also develops and manages Internet sites, creates social networking communities, and plans live and virtual events.

0 Comments



Leave a Reply.

Services

Reputation Management
High-Stakes Issues Management
​Digital Innovation Strategies

Company

About
Leadership
Experience

Support

Connect
​Privacy Policy & Terms of Use
© COPYRIGHT 2021 OR EARLIER.
​ALL RIGHTS RESERVED.
  • Who We Are
  • What We Do
    • Reputation Management
    • High-Stakes Issues
    • Digital & Innovation
    • Experience
  • Interviews
  • News
  • Connect