The Virtual Territory of the Digital Desperadoes
The Internet is a dangerous âdigital frontierâ where anything goes. Malicious online criminals can trash your reputation by spreading vile lies and outrageous smears without having to worry about the consequences. Anonymous attacks against you or your business can spread from Web site to Web site like wildfire, viewable by anyone with Internet access. Lawmakers have not yet controlled the Internetâs wild side, and law enforcement can do little to apprehend unknown, unnamed, unseen perpetrators. Since the Internet is still evolving, complete social norms have not yet formed to dictate what is acceptable to do or say online.
âSmears that would once have been limited to a bathroom stall or a hand-passed note can now be seen by employers, friends, families, dates, clients and anyone else with access to the Web.â
The Internet strongly resembles the âWild West,â a raw, lawless land where hardy settlers had to fend for themselves. The Internetâs tradition of self-policing matches the Old Westâs customs and attitudes. Online pornography and betting quickly became popular during the birth of the Internet, just as prostitution and gambling thrived in the early days of the American West.
âYour reputation can be created or destroyed in just a few clicks.â
Primary online players such as Google generally have a hands-off policy about the ways bitter or unhinged people can use their powerful online applications for nefarious purposes, such as ruining your reputation or your business, so itâs easy to post vicious slanders that search engines will retrieve. Miscreants on the Web can undermine your reputation because:
- âEveryone can createâ â Anyone can become an online publisher and build blogs, social media pages, Twitter accounts, Web sites, and more.
- âEveryone is (almost) equalâ â Anyone can set up a page that looks like a legitimate business just by purchasing a reputable domain name.
- âEverything is online somewhereâ â The Internet has no limits. Data about everything â including you â can appear on countless Web sites.
- âEverything is instantâ â People can access all sorts of information immediately, including negative reports about you.
- âEverything is permanentâ â Once information hits the Internet, it can bounce around cyberspace forever. Cache technology saves copies of the Web pages that people open.
- âEverything is powerfulâ â For instance, face-recognition software now exists that can identify you in an obscure group photo posted online.
âPeople suspected of wrongdoing are run out of town on an electronic rail, often before there is time to figure out whether they are really guilty or innocent.â
You canât track people who post data online. Such anonymity, one of the Internetâs most insidious characteristics, protects illicit operations. Virtual-world covertness stands in sharp contrast to the real world, where it is difficult to hide who you are. People are less inclined to engage in outrageous behavior if they know they can be identified and caught. Many perpetrators engage in online activities anonymously that they would never attempt openly in the offline world. Internet protocols and most legal systems encourage online anonymity, but that translates to a total lack of accountability.
âAnything that is said online may be available forever, no matter how hard anyone tries to delete it.â
Attackers may target you, your business or another person because of:
- âJealousy, envy and revengeâ â Such negative feelings apparently account for more than 50% of online attacks against individualsâ reputations.
- âBullyingâ â This is so common it has a name: âcyberbullying.â
- âVigilante justiceâ â People who wrongly see you as a villain may try to destroy you.
- âPoliticsâ â Already dirty enough in the real world, political battles can grow particularly noxious in cyberspace, where anonymity cloaks false accusations.
- âGreedâ â Unethical competitors may damage your companyâs reputation.
- âExtortionâ â Cyber criminals may smear you online and ask you to pay them to stop.
- âSocial gossipâ â The Internet has become the worldâs rumor mill.
- âSociopathyâ â The Web is a powerful tool for those seeking to humiliate and hurt others.
âPowerful anonymity combined with outdated laws has allowed a complete lack of accountability for online content.â
Many people trust the Internet and believe everything online is accurate. Thus, readers may assume that false or negative reports about you are true. This is particularly likely if you already have a negative âGoogle trail,â that is, if a series of search hits depict you unfavorably. The Web has no built-in accuracy gatekeeper, a major concern if you have an online reputation to protect.
âEvery day, thousands of innocent victims find that they have been smeared, slandered and dragged through the mud online by one or more attackers.â
A good reputation is an incredibly valuable asset that tells others you deserve their trust so they will work with you, value your opinion and respect you. Conversely, a bad reputation can cause others to avoid you and refuse to do business with you. To protect yourself, you must understand that your online reputation will quickly become your offline reputation, too. And, since your reputation depends entirely on other peopleâs perceptions, negative online comments can shape how others see you.
âDangerous information is often like an iceberg: What you see at the top of a Google search is often the tip of what is available online.â
Online attacks vary in âcontentâ and in âformat,â or mode of distribution. Content concerns the material an online nemesis posts, such as compromising data or manipulated photos. Distribution methods vary, from single e-mails to mass e-mailed bombardments to untrue Web site entries. Other harmful tactics include setting up insulting Internet sites and spreading attacks on social networks. For example, JuicyCampus, a Web site which is now defunct, served as a prime rumor and scandal hub for college students. You can become the victim of âGooglebombing,â the fraudulent distribution of smears to searchers who actually are looking for something else, or âGooglestuffing,â âthe act of spreading false and negative content in an attempt to fill (âstuffâ) the first 10 links in a search engine search.â In other words, the intent of Googlestuffing is to be sure a searcher finds only negative information about a given subject.
âSelf-Reinforcing Cyclesâ
Online information is powerful because the Internet is a popular research medium. Searching for data via a search engine is much easier than using standard journalistic sources, like reputable newspapers and magazines that verify the information they publish. As the worldâs leading search engine, Google can seriously damage your reputation. This is due, in part, to its carefully guarded search algorithm, which generates self-reinforcing cycles of data. Google prioritizes its Web search findings based on the popularity of individual sites, as indicated by their number of links. So, when someone searches for your name or your company, Google returns all the Web pages that mention you or your business, including sites with harmful information. Because of the salacious nature of these sites, more people tend to look for them, comment on them and link them to other sites. Google interprets such activity as increased popularity and, thus, moves the negative Web sites further forward in its search rankings. Then, more people see them and link to them, further increasing their popularity. Such search engine cycles can slam your reputation.
Determining the Extent of Reputation Damage
An online attack can damage your individual reputation on three levels: personal, social and professional. Damage to your personal reputation may affect your relationships with friends, relatives and colleagues. Your social reputation reaches a broader arena, including your community. Your professional reputation is the intangible asset that enables you to make a living.
âThe Internet has...democratized extortion, just as it has democratized information.â
To calculate how much damage an online smear may have done, use the âLibel Indexâ formula: âpotential harm equals audience size multiplied by the closeness of the audience.â Negative data distributed to an extremely large audience that does not touch your life in a meaningful way (like people in a distant country) generally harms your reputation less than smears sent to a smaller, but closer audience (your neighbors or colleagues). Consider where smears appear. Bad data that pops up on the initial pages of search engine findings is more damaging than data on later pages.
Your âOnline Reputation Auditâ
Perform an online audit, or hire a professional reputation management firm to do it for you. An audit can determine what you are dealing with online by cataloguing the results of extensively searching for your name. Begin by developing a âreputation road mapâ detailing exactly who â what audiences â might search the Web for data about you or your work. Listing your roles (business owner, board member, volunteer, parent) will help you identify your constituencies. Consider how people might search for data about you. Your audit will help you determine how much damage your reputation has sustained from online smears. Dig deep. Scroll through at least the first 10 pages of Google search results to see what is available about you. Treat your search returns like an iceberg: What you donât see or pay attention to can sink you and your reputation.
âSeveral people...have discovered fake MySpace profile pages created about them, often with insulting or embarrassing fake content.â
Audit all aspects of your âonline profile.â Use the same search terms people in your various audiences may use to search for you. If you find something negative, run more keywords that are close to your original search term. Google your name thoroughly and then conduct a survey using other search engines such as Yahoo Search, Ask and Bing. Donât neglect minor engines like Spock, a Web site designed to find information about people. Investigate social sites as well.
Go On the Offensive
Once you assess the online damage your reputation has sustained, develop a strategy to restore your good name or your companyâs standing. If possible, determine where the smears originated. The Internet is rife with cases of mistaken identity, so if a site has posted incorrect information, you may be able to get its Webmaster to remove the untrue data.
âWikipedia is a massive free online encyclopedia. It can be edited by anyone, which creates a constant risk of vandalism and reputation attacks.â
Purely defensive action isnât enough to protect your online reputation. You must go on the offensive, seeding positive references about yourself all over the Internet. Start a blog. Create an online persona on social media sites. Twitter extensively. Get friends to post positive news about you via blog comments, tweets, social site entries, and so on. Plant the information you want people to find when they search your name. Comprehensively link as much of this positive information together as you can to make it appear highly popular to Googleâs search algorithm. This will push good news about you higher up in the search rankings.
âFor many professionals, your image is your business.â
Control your identity online so that those who wish to harm you or your company canât manage your Internet presence. Secure all user names, Web sites and URLs that might be relevant so you prevent others from taking them for nefarious purposes. You donât have to add content to each of these online components, though you can. Treat them as placeholders so others canât use them against you or misrepresent themselves as you. Of course, removing all harmful Internet content may be impossible. However, you can smother a lot of negative, mistaken information with good, truthful information by creating a protective âGoogle wallâ of positive data.
âA false appearance of controversy can be just as bad as actual guilt in some professions.â
If someone has attacked your business online, contact other firms that have dealt successfully with such assaults. Find out what they did. Apply their tactics if they make sense. If you can identify your online attackers, despite the barricade of anonymity, deal with them immediately and notify them to cease and desist. Of course, uncovering who has harmed you is never easy, but try thinking like a detective. Can you attach a meaning to any clues the assailant may have left? Do the aggressors seem to know intimate details about your life? Have they posted photos only someone close to you could have taken? Narrow your choices to potential suspects if you can.
âYour online reputation is your reputation. Period.â
You may want to sue your attackers â if you identify them â but that has drawbacks. They may have limited resources, so you would receive nothing for your trouble, even if you expend the time and money to win a judgment. Once smears are on the Web, they assume a life of their own, so your suit would not correct any damage thatâs already been done to you or your business. Would that matter? Or would you find it sufficiently satisfying just to sue those who tried to ruin your reputation? Discuss your options with a lawyer who practices in the area of âInternet-based defamation.â Meanwhile, proactively control your online reputation by creating positive content.