Tag Archive for: #SocialMedia

Blog: The psychology behind why people create online scams and fraud

We explore the psychology behind online scams and frauds, including common tactics used by scammers, the impact of such activities on individuals and society, legal consequences for those participating in these activities, and ways to verify the authenticity and protect oneself from online fraud.

Writer: Emmanuel Bida Thomas

Unfortunately, online scams and frauds are all too common in today’s digital age. Despite efforts to increase awareness and educate people about these types of fraud, they continue to occur at an alarming rate. The psychology behind why people create online scams and frauds is complex and multifaceted. In this blog post, we’ll explore some of the common tactics used by scammers, the impact of online scams and frauds on individuals and society as a whole, the legal consequences of participating in online scams and frauds, how to verify the authenticity of scams such as job offers or recruitment messages, and how to protect oneself from online job scams and frauds.

The global prevalence of online scams and fraud

According to PwC’s Global Economic Crime and Fraud Survey 2022, 51% of surveyed organisations say they experienced fraud in the past two years, the highest level in their 20 years of research. The survey of 1,296 executives across 53 countries and regions also shows that fraudsters are becoming more sophisticated in their tactics. In a survey of over 5,000 respondents across 99 global territories in 2020, PricewaterhouseCoopers (PwC) found that 47 per cent had suffered at least one form of fraud in the prior 24 months—averaging six per company. These were commonly customer fraud, cybercrime, asset misappropriation, bribery, and corruption, costing $42 billion.

The Psychology Behind Online Scams and Frauds

The desire for financial gain is the root of most online scams and frauds. Scammers often use social engineering techniques to manipulate victims into giving up personal information, money, or sensitive data. These techniques exploit human vulnerabilities, including fear, curiosity, greed, and compassion. For example, some scammers may pose as a trustworthy authority figures, such as a doctor or government official, to convince their victims to hand over sensitive information.

Others may use emotional appeals, promising quick riches or presenting themselves as long-lost friends or loved ones needing urgent help. Still, others may use threats or blackmail to extort money or information from their victims. Ultimately, the success of any scam relies on the victim’s willingness to trust the scammer and act upon their demands.

Socio-economic factors contributing to online scams and positive impacts

Some people may use online scams to survive in countries with limited economic opportunities. While this does not justify fraudulent behaviour, it is essential to acknowledge that underlying socioeconomic factors may contribute to the prevalence of online scams.

It’s important to understand that people engage in fraudulent behaviour for various reasons. These reasons are often related to broader societal issues such as poverty, inequality, and lack of access to education and economic opportunities. While it’s never acceptable to engage in fraud or other illegal activities, addressing the root causes of these behaviours is essential to create a more just and equitable society. One way to do this is by investing in programs and policies that promote economic growth and opportunity, improve access to education and training, and support marginalised communities. A holistic approach to addressing these issues can reduce the prevalence of online scams and other forms of fraud while promoting more significant social and economic justice.

It is difficult to find any positive impacts of online scams. However, some studies suggest that online shaming can have positive influences, such as the communication of group norms and the punishment of their violation by elevating the status of those enforcing them. 

The four stages of a scam are:

The typical stages of a scam are from when the scammer first contacts a potential victim to the victim realising they’ve been defrauded.

The opportunity is also called setup: Scammers contact potential victims. They often have tremendous success if the victim is experiencing a vulnerable period in their life. The scammer sets up the scam, which involves creating a fake story or scenario to trick the victim into parting with their money or personal information. 

The hook or scam itself: The scammer makes initial contact with the victim and uses various tactics to gain their trust and confidence, such as offering a fake investment opportunity or pretending to be a government agency. Fraudsters create a credible fake story to target victims, such as a bank staff member, an investment expert, a seller of goods or a romantic interest. Scammers use imitation to appear more believable. Tactics include spoofing phone numbers or using fake reviews to create credible online ads. Scammers build a relationship with the victim by appearing likeable and establishing similarities.

The payoff, known as payment: The scammer convinces the victim to send them money or provide personal information, often by promising a significant return on investment or threatening legal action if they don’t comply. Scammers create an overwhelming sense of urgency, leaving victims little time to double-check details and manipulating them into dismissing warnings from experts, family members or friends.

The endgame and aftermath: The scammer disappears with the victim’s money or personal information, leaving them with little recourse for recovery. In some cases, the scammer may continue to contact the victim to get more money or information from them. The victim realises that they’ve been scammed, often causing feelings of distress and shame. Too often, banks and the police don’t deal with the situation well, leaving the victim under further stress. On many occasions, the victim isn’t reimbursed for their losses.

Common Tactics Used by Scammers

Scammers use various tactics to trick people into giving them money or personal information. Some of the most common tactics used by scammers include impersonation, urgency, and emotional manipulation:

  • Phishing emails and text messages: Appear to be from a reputable source but contain links or attachments that install malware or steal personal information.
  • Advance fee scams: These are scams where the scammer poses as a wealthy individual who needs help transferring funds out of their country. The victim is promised a reward for helping but is asked to pay various fees upfront, which are never returned.
  • Charity scams: These are scams where the scammer poses as a charitable organisation and solicits donations from unsuspecting individuals. The money collected is often never used for its intended purpose.
  • Impersonation scams: These are scams where the scammer poses as a legitimate authority figure, such as a government official, police officer, or bank representative. They use this guise to obtain personal or sensitive information from their victims.

Impact of Online Scams and Frauds

The impact of online scams and frauds can devastate individuals and society. Victims can suffer financial losses, identity theft, and emotional distress. Online scams and frauds can undermine trust in institutions and the economy. Victims may also face legal consequences if they unknowingly participate in illegal activities, such as money laundering or wire fraud.

Online scams and frauds impact society, eroding trust and confidence in digital transactions and communication. This can lead to decreased adoption of new technologies and increased costs for businesses that must invest in cybersecurity measures to protect themselves and their customers. According to the International Monetary Fund (IMF), incidents that corrupt the integrity of financial data can potentially undermine trust and confidence more broadly. In addition, exposure to online misinformation has been linked to lower trust in mainstream media across party lines.

Legal Consequences of Participating in Online Scams and Frauds

Participating in online scams and frauds can have serious legal consequences. Depending on the nature and scope of the scam, individuals who are caught may face fines, imprisonment, or both. In some cases, individuals may also be required to pay restitution to their victims.

How to Verify the Authenticity of Scams

It’s important to verify the authenticity of any message or job offer before providing personal or sensitive information. Some ways to do this include:

-Researching the company or organisation online to see if they have a legitimate website or social media presence.

  • Contact the company or organisation directly to confirm the message’s legitimacy or offer.
  • Checking with relevant authorities, such as the Better Business Bureau or local law enforcement, to see if any reports of fraud or scams are associated with the company or organisation.

How to Protect Oneself from Online Scams and Frauds

There are several things that individuals can do to protect themselves from online scams and frauds:

  • Be cautious about providing personal or sensitive information online.
  • Avoid clicking on links or downloading attachments from unknown sources.
  • Use strong passwords and two-factor authentication for online accounts.
  • Install antivirus software and keep it updated.
  • Report any suspicious activity to relevant authorities.

A fairer system for scam victims

South Sudan has been plagued by scams and frauds, leaving many victims without justice or compensation. To establish a fairer system, the establishment of Computer Incident Response Term (CIRT), a centralised government agency by the National Community Authority, should be expedited to handle scams and fraud reports. CIRT should employ trained investigators who work with victims to gather evidence and pursue legal action against scammers. Scam victims should be provided with counselling services, information on avoiding scams and establishing a compensation fund in the future. The legal system must be strengthened to ensure that scammers are held accountable, and victims receive justice. Education and awareness campaigns could be implemented to help prevent future scams by educating the public on how to spot and avoid them.

Computer Incident Response Teams (CIRTs) can effectively combat online scams by providing a coordinated and rapid response to security incidents. CIRTs can help to identify and contain security incidents, minimise damage, and restore normal operations as quickly as possible. They can also help to prevent future incidents by identifying vulnerabilities and implementing security measures to address them. 

While implementing such a system may require significant resources and effort, it could provide much-needed support and justice to victims of scams in South Sudan.

New laws could provide more excellent protection

Two significant pieces of legislation that are yet to go through parliament will help to provide improved protections against scams or help for scam victims in South Sudan:

The Data Protection Bill aims to regulate the collection, use, storage, and sharing of personal data by individuals, organisations, and institutions. It will hold online platforms responsible for fraudulent content and ads, which means that they will be required to take steps to prevent the spread of malicious advertisements and fake news on their platforms. This could help reduce the number of online scams and provide more excellent protection to consumers who may fall victim to these scams.

The Cybercrime and Computer Misuse Bill addresses cybercrime activities such as hacking, identity theft, and phishing. The bill criminalises computer-related offences and provides penalties for those found guilty of engaging in such activities. This bill can help deter cybercriminals from carrying out illegal activities by imposing stiff penalties and providing a legal framework within which law enforcement agencies can investigate and prosecute cybercriminals.

Conclusion

Unfortunately, online scams and frauds are a reality in today’s digital age. The psychology behind why people create these types of fraud is complex but often involves a desire for financial gain. To protect oneself from these types of scams, it’s essential to be cautious about providing personal information online and to verify the authenticity of any message or job offer before acting upon it. By staying vigilant and informed, individuals can avoid falling victim to online scams and fraud.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

Fact-check: Photo of a driver on a muddy road not from South Sudan

The picture of a driver posing for a picture on a muddy road is not originally from  South Sudan; the image has been doing the rounds online since at least September 2019.

Writer: Beatrice Amude Paulino

Dalwuot Media, a Facebook page with 41,000 followers claiming to be a media and news company in South Sudan, posted an image on 8 May 2023 with a caption stating that it was a rare picture of a driver enjoying driving on a muddy road in South Sudan. However, this claim is false.

The post could not provide contextual information regarding when or where the photo was originally taken in South Sudan. This lack of information further supports the notion that the picture is not a genuine depiction of the country’s muddy roads.

A rare picture of a driver poses while enjoying driving in muddy South Sudan road,” the post that has since attracted over 220 reactions, 25 comments and three shares reads.

Screenshot of the post as shared by Dalmout Media

A reverse image search of the picture revealed that it had been used previously on various other platforms, such as blogs, Facebook posts, and tweets by publishers in Nigeria, Kenya, and Zambia. Most of these uses were satirical and unrelated to South Sudan, indicating that the picture is not unique to South Sudan.

It was first posted with the Kiswahili caption, ““Maneno ikiisha ukwame katikati ya 70 page #Thesis alafu utoke nje ujiulize mbona uliingia writing,” on September 30, 2019, by Genius Research and Consultant. This page describes itself as a full services business leading in research and training in Kakamega, Kenya.

“When you run out of words, you get stuck in the middle of a 70-page #Thesis, and then you go out and ask yourself why you started writing,” Google translation of the caption.  

The same picture was also used by Facebook Zambia Blog, a Facebook page on November 24, 2019.

This is not the first time Dalwuot Media has shared false information on its platform. In April 2023, the page claimed that Al Fateh tower had been destroyed in the ongoing fighting in Sudan, but this claim was also proven to be false after a fact-check investigation.

Conclusion:

The claim made by Dalwuot Media about the picture of a driver posing for a photo on a muddy road in South Sudan is false. The image is not originally from South Sudan but was randomly collected from the internet to fabricate a story that has not occurred in South Sudan.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

It is crucial to fight against misinformation and disinformation in mainstream and alternative media by avoiding becoming a victim of fake news. To prevent the spread of false information, you must refrain from sharing content you are unsure about or unaware of its origin. Disinformation and misinformation can be incredibly dangerous because they can mislead people and cause harm. For instance, false information on health matters can lead to wrong decisions that can put people’s lives at risk. Therefore, it’s vital to fact-check information before sharing it to promote accurate and reliable information. Visit https://211check.org/ for more information on our fact-checking process, or send us a WhatsApp message at +211 917 298 255 if you want to present a claim. Our team will promptly respond to your request because we believe #FactsMatter.

Fact-check: Watch out for this WFP job scam on WhatsApp, don’t be fooled by fake recruitment messages

The WhatsApp message soliciting job applications for the World Food Programme via a one-page dubious site is false and potentially malicious.

Writer: Jibi Moses

A WhatsApp message claiming to be from the World Food Programme (WFP) and soliciting job applications through an unrelated link is false. The WFP has not issued any such message, nor is there any active recruitment campaign by the organisation.

“Welcome to World Food Programme Application Form Portal. Click on the link below to start your registration. All Nationalities are eligible to Apply,” the false claim reads in part.

A screenshot of the WhatsApp message doing the rounds

Investigation:

Upon investigation, it has been found that the message is false, and the link provided is a dubious site that mimics the official job application portal of the World Food Programme. 

A screenshot of the first page of the unrelated advertisement site

Job seekers are asked to apply via this site and then share the message with five friends or 15 groups on WhatsApp to qualify. However, it is essential to note that the World Food Programme does not solicit job applications this way, and any such message is fraudulent.

A screenshot of the site’s last page requesting applicants to share the link

A scan of the site using VirusTotal, a free online virus scanner, has flagged it as malicious, and it is advised that users do not visit or use the site. Job seekers are advised to apply for vacancies at the World Food Programme through the official website.

Whois record a publicly available database that contains information about domain name registrations search for both websites returns two different results, as seen here and here.

While the domain for the dubious site was registered on 10 March 2023, the authentic wfp.org domain was registered on 06 October 1994.

Domain registration information for the false site

Domain registration information for the wfp.org 

The World Food Programme (WFP) has warned of a fake WhatsApp message claiming recruitment claims of scammers. The WFP advises people to be cautious of such scams and report them if they encounter any. 

Conclusion:

The message claiming to be the World Food Programme Application Form Portal and circulating on WhatsApp is false. Job seekers should be cautious of such messages and only apply for vacancies through the official website. 

Be vigilant and cautious while dealing with unsolicited messages, and take appropriate measures to protect yourself from online scams and frauds. It is essential to exercise caution when clicking on links or downloading attachments sent via unsolicited messages, especially if they claim to be from reputable organisations like the World Food Program (WFP). In this case, the message is a scam designed to extort personal information from unsuspecting individuals.

If you receive such messages, verifying their authenticity before action is advisable. One can do so by checking the official website of the organisation or contacting them directly through their official channels.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

It is crucial to fight against misinformation and disinformation in mainstream and alternative media by avoiding becoming a victim of fake news. To prevent the spread of false information, you must refrain from sharing content you are unsure about or unaware of its origin. Disinformation and misinformation can be incredibly dangerous because they can mislead people and cause harm. For instance, false information on health matters can lead to wrong decisions that can put people’s lives at risk. Therefore, it’s vital to fact-check information before sharing it to promote accurate and reliable information. Visit https://211check.org/ for more information on our fact-checking process, or send us a WhatsApp message at +211 917 298 255 if you want to present a claim. Our team will promptly respond to your request because we believe #FactsMatter.

Fact-check: Uncertainty surrounds the cause of dead fish in Bentiu, South Sudan

The cause of dead fish in Bentiu, Unity State, South Sudan, remains unclear, and investigations are required to establish the exact reason behind their deaths.

Writer: Jibi Moses  

Recently, images of presumably dead fish allegedly from Bentiu in Unity State, South Sudan, have been doing the rounds on social media platforms like Twitter, Facebook, and WhatsApp, attributed to “Oil pollution” that is believed to be causing serious, devastating effects to aquatic animals.

The images were first shared on the 2nd of May on Twitter by  Poth Johnson Matur, a journalist in the Office of the President. “Oil pollution causes serious, devastating effects on aquatic animals in Unity State Bentiu, South Sudan,” reads the caption of his tweet that garnered 39 retweets, 18 quotes and 62 likes.

211 Check wrote to Poth Johnson Matur to ask if he had taken the photos himself and to provide more contextual information, but he didn’t reply despite seeing the message at the time of this publication.

The images were later shared on Facebook by South Sudan Exposed, Hot in Juba, and Insight in Juba; some individuals used the same pictures, including Facebook users, who went live and posted.

The main concern of these posts is directly pointed at either pollution caused by the activities of oil exploration in Bentiu, Unity State and the dredging, which was a contentious issue in the country by late last year when the citizens cited environmental dangers of the activities; however, early this year it kicked off in some parts of Bentiu.  

Screenshot of the images as tweeted

Investigation:

Reverse image search on Google, Bing, and Yandex does not provide any information about the origin of these images, suggesting that they may be new. However, visual clues such as the electricity line and vegetation type suggest that the location could be Bentiu.

The press secretary in the office of the area governor initially posted on Facebook dismissing the claims as false but later deleted the post. This could indicate some truth to the allegations, but more investigations need to be done to determine the actual cause of the fish deaths.

A screenshot of the post (later deleted) by the Office of the Governor- Unity State Press Unit.

State authorities in the area confirmed the incident as true, according to a news report published by Juba Echo, an independent news website, on Thursday.

Johnson Bol, the Director General for the Unity State Ministry of Animal Resources and Fisheries, said on Thursday that a huge number of fish have died due to poor disposal of oil waste and chemicals by Greater Pioneer Operating Company (GPOC) in Lalop area,” the report partly stated.

Nhial Makuei, a Bentiu resident, told 211 Check the pictures in circulation are from Bentiu, Unity State oil field and that the fish got trapped in a pond dug along the roadside during construction.

When the Naam stream flooded, different fish came with water and got trapped in a pond dug along the roadside during construction when the flood reduced to the mainstream between March and April this year,” Nhial said. “Only Tilapia fish are affected; however, the rest of the fish survived to date,” he added. He said that the same area got flooded last year.

History of floods in Bentiu, Unity State:

Bentiu has been one of the areas disastrously affected by the rains since 2020,  which caused the River Nile to burst its banks, submerging most of the land in the state in floods. This caused a lot of loss of lives of people, animals and destruction and loss of property.

The floods also destroyed the dykes that were previously built to control the flow of the water, and with the floods raging on, constructing new ones made the situation very difficult. According to IOM, one of the Humanitarian organisations working in the area, at the onset of the floods in August 2020, there was a massive displacement of 608 households, which has persisted to date with a large area still in water affecting a large number of people.

These pictures have caused a mixture of reactions from the South Sudanese, with many believing that the impact of negligent oil companies and the dredging ongoing in the state is causing it. When not fact-checked, this causes panic, fear and hatred among the citizens.

Conclusion:

While it is clear that there has been an incident involving dead fish in Bentiu, Unity State, South Sudan, the exact cause of their deaths remains unclear. While some sources claim that it is due to oil pollution, other factors, such as a reduction in the area’s water level, could also contribute to the situation. Therefore, more thorough investigations are needed to establish the cause of this incident.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

It is crucial to fight against misinformation and disinformation in mainstream and alternative media by avoiding becoming a victim of fake news. To prevent the spread of false information, you must refrain from sharing content you are unsure about or unaware of its origin. Disinformation and misinformation can be incredibly dangerous because they can mislead people and cause harm. For instance, false information on health matters can lead to wrong decisions that can put people’s lives at risk. Therefore, it’s vital to fact-check information before sharing it to promote accurate and reliable information. Visit https://211check.org/ for more information on our fact-checking process, or send us a WhatsApp message at +211 917 298 255 if you want to present a claim. Our team will promptly respond to your request because we believe #FactsMatter.

Explainer: Propaganda, misinformation or disinformation; what are they?

Analysts generally agree that disinformation is always purposeful and not necessarily composed of lies or fabrications. It can be composed of primarily true facts, stripped of context or blended with falsehoods to support the intended message, and is always part of a larger plan or agenda.

Writer: Jibi Moses

Propaganda is disseminating information—facts, arguments, rumours, half-truths, or lies—to influence public opinion.

Propaganda is the more or less systematic effort to manipulate other people’s beliefs, attitudes, or actions using symbols (words, gestures, banners, monuments, music, clothing, insignia, hairstyles, designs on coins and postage stamps, and so forth). Deliberateness and a heavy emphasis on manipulation distinguish propaganda from casual conversation or the free and easy exchange of ideas. Propagandists have a specific goal or set of goals. To achieve these, they deliberately select facts, arguments, and displays of symbols and present them in ways they think will have the most effect. To maximise effect, they may omit or distort pertinent facts or lie, and they may try to divert the attention of the reactors (the people they are trying to sway) from everything but their own propaganda.

Comparatively deliberate selectivity and manipulation also distinguish propaganda from Education. Educators try to present various sides of an issue—the grounds for doubting, the grounds for believing their statements, and the disadvantages and advantages of every conceivable course of action. Education aims to induce reactors to collect and evaluate evidence for themselves and assists them in learning the techniques for doing so. It must be noted, however, that some propagandists may look upon themselves as educators and may believe that they are uttering the purest truth, that they are emphasising or distorting certain aspects of the truth only to make a valid message more persuasive, or that the courses of action that they recommend are the best actions that the reactor could take. By the same token, the reactor who regards the propagandist’s message as self-evident truth may think of it as educational; this often seems to be the case with “true believers”—dogmatic reactors to dogmatic religious, social, or political propaganda. “Education” for one person may be “propaganda” for another.

Propaganda and related concepts

Connotations of the term propaganda

The word propaganda itself, as used in recent centuries, apparently derives from the title and work of the Congregatio de Propaganda Fide (Congregation for Propagation of the Faith), an organisation of Roman Catholic cardinals founded in 1622 to carry on missionary work. To many Roman Catholics, the word may have a highly respectable connotation, at least in missionary or ecclesiastical terms. But even to these persons, and indeed, to many others, the term is often a pejorative one tending to connote such things as the discredited atrocity stories and deceptively stated war aims of World Wars I and II, the operations of the Nazis’ Ministry of Public Enlightenment and Propaganda, and the broken campaign promises of a thousand politicians. Also, it is reminiscent of countless instances of false and misleading advertising (especially in countries using Latin languages, in which propaganda commercials or some equivalent is a common term for commercial advertising).

Alfred M. Lee and Elizabeth B. Lee classified the Propaganda devices into seven major categories: name-calling, Glittering generalities, transfer, testimonial, Plain-folk, Card-stacking and Bandwagon.

Misinformation is false or inaccurate information. Examples include rumours, insults and pranks. Disinformation is deliberate and includes malicious content such as hoaxes, spear phishing and propaganda. It spreads fear and suspicion among the population. The following are the categories of misinformation and disinformation: Fabricated Content: Completely false content; Manipulated Content: Genuine information or imagery that has been distorted like a sensational headline or populist ‘clickbait’; Imposter Content: Impersonation of genuine sources, e.g. using the branding of an established agency; Misleading Content: Misleading information, like a comment presented as fact; False Context: Factually accurate content combined with false contextual information, e.g. when the headline of an article does not reflect the content; Satire and Parody: Humorous but false stores passed off as true. There is no intention to harm, but readers may be fooled; False Connections: When headlines, visuals or captions do not support the content; Sponsored Content: Advertising or PR disguised as editorial content; Propaganda: Content used to manage attitudes, values and knowledge; and Error: A mistake made by established new agencies in their reporting. 

The rise of Artificial Intelligence (AI) has also given birth to new forms of misinformation and disinformation. We call this Synthetic Media to indicate the artificial production, manipulation and modification of data and multimedia by automated means, especially AI algorithms, to mislead or change the original meaning. There are fears that synthetic media could supercharge fake news, spread misinformation and distrust of reality and automate creative jobs. ‘Deep Fakes’ are one type of synthetic media where a person in an existing image or video is replaced with someone else’s likeness. While faking content is not new, deep fakes use powerful techniques from machine learning and AI to manipulate or generate visual and audio content with a high potential to deceive. Deep Fakes have garnered widespread attention for their use in revenge porn, fake news, hoaxes and financial fraud. Industry and governments are concerned to detect and limit their use. Some countries already have a national response, or institutions are working on it. “Speech Synthesis” is another branch of synthetic media that can artificially produce human speech. A computer used for this purpose is called a “speech computer” or “speech synthesiser”. Synthesised speech concatenates pieces of recorded speech or incorporates a model of the vocal tract and other human voice characteristics to create a completely “synthetic” voice.

In addition to new and more sophisticated ways of manipulating content, there are also a growing number of ways in which Social Media can be used to manipulate conversations: A Sockpuppet is an online identity used to deceive. The term now extends to misleading uses of online identities to praise, defend or support a person or organisation; to manipulate public opinion; or to circumvent restrictions, suspension or an outright ban from a website. The difference between a pseudonym and a sockpuppet is that the sockpuppet poses as an independent third party, unaffiliated with the main account holder. Sock Puppets are unwelcome in many online communities and forums; Sealioning is a type of trolling or harassment where people are pursued with persistent requests for evidence or repeated questions. A pretence of civility and sincerity is maintained with these incessant, bad-faith invitations to debate; Astroturfing masks the sponsors of a message (e.g. political, religious, advertising or PR organisations) to make it appear as though it comes from grassroots participants. The practice aims to give organisations credibility by withholding information about their motives or financial connections; Catfishing is a form of fraud where a person creates a sockpuppet or fake identity to target a particular victim on Social Media. It is common for romance scams on dating websites. It may be done for financial gain, to compromise a victim or as a form of trolling or wish fulfilment.

Disinformation is a relatively new word. Most observers trace it back to the Russian word dezinformatsiya, which Soviet planners in the 1950s defined as “dissemination (in the press, on the radio, etc.) of false reports intended to mislead public opinion.” Others suggest that the earliest use of the term originated in 1930s Nazi Germany. In either case, it is much younger (and less commonly used) than ‘propaganda,’ which originated in the 1600s and generally connoted the selective use of information for political effect.

Whether and to what degree these terms overlap is subject to debate. Some define propaganda as using non-rational arguments to either advance or undermine a political ideal and use disinformation as an alternative name for undermining propaganda. Others consider them to be separate concepts altogether. One popular distinction holds that disinformation also describes politically motivated messaging designed explicitly to engender public cynicism, uncertainty, apathy, distrust, and paranoia, which disincentivise citizen engagement and mobilisation for social or political change. “Misinformation” generally refers to the inadvertent sharing of false information.

Analysts generally agree that disinformation is always purposeful and not necessarily composed of lies or fabrications. It can be composed of primarily true facts, stripped of context or blended with falsehoods to support the intended message, and is always part of a larger plan or agenda. In the Russian context, observers have described its use to pursue Moscow’s foreign policy goals through a “4D” offensive: dismiss an opponent’s claims or allegations, distort events to serve political purposes, distract from one’s own activities, and dismay those who might otherwise oppose one’s goals.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

Explainer: Distributed Denial of Service Attack (DDoS Attack)

This article discusses Distributed Denial of Service (DDoS) attacks, how they can be prevented and mitigated, and their potential impact on businesses.

Writer: Jibi Moses

Distributed denial of service (DDoS) attacks are now everyday occurrences. Whether a small non-profit or a huge multinational conglomerate, the organisation’s online services—email, websites, anything that faces the internet—can be slowed or completely stopped by a DDoS attack. For data centres, colocation, hosting and other service providers, DDoS attacks threaten the infrastructure that provides network and service availability to all its tenants, subscribers and customers and can target the most valuable customers.

A successful DDoS attack can seriously damage a brand’s reputation and cost hundreds or even millions of dollars in revenue. Moreover, DDoS attacks are sometimes used to distract cybersecurity operations while other criminal activity, such as data theft or network infiltration, is underway.

A Denial-of-Service (DoS) attack shuts down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash. Some definitions of the DoS can be found here, here, here and here.

Network traffic is the data moving across a computer network at any given time. Network traffic, also called data traffic, is broken down into data packets and sent over a network before being reassembled by the receiving device or computer.  In the case of an attack, keep sight of the other hosts, assets, or services residing on your network.

Meanwhile, a Distributed denial-of-Service (DDoS) attack is a DoS attack that uses multiple computers or machines to flood a targeted resource. Both attacks overload a server or web application, intending to interrupt services. 

Many attackers conduct DoS or DDoS attacks to deflect attention away from their intended target and use the opportunity to conduct secondary attacks on other services within your network. 

These attacks come in many forms: Volume-based attacks, Protocol attacks, Application-layer attacks, UDP attacks, ICMP attacks, Ping of death, Slowloris, and NTP application attacks. 

All the above affect the victim(s) differently but with a similar intention of disrupting the user. However, this doesn’t give the attacker access to the website he/ she has attacked.

A recent example of a DDoS attack in South Sudan was the attack on the Bank of South Sudan site. The local media was awash with the news, as reported by Eye Radio, CityReview, and Sudan Post, A mysterious group calling itself Anonymous South Sudan, claimed responsibility of the attack, citing high inflation rates as the main reason for hacking the bank’s website. Calling for a drop in the wanted South Sudanese Pounds exchange rate to  400 SSPP per 1 USD.

Besides in the other parts of the world, there are some popular and recent DDoS attacks; the Github hub attack in Feb 2018, the Mirai botnet attack in 2016, The AWS DDoS Attack in 2020 and the European Gambling Company in 2021.

Meanwhile, Denial of Service should be distinct from Hacking. According to Malwarebytes: Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes, nowadays, most references to hacking, and hackers, characterise it/them as unlawful activity by cybercriminals—motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge. Another point is that hackers have total control of the site or whatever they have broken into, unlike DDoS, whereby the system is flooded with traffic to interrupt the system. However, DDoS is one of the many tools for hacking. 

Prevention:

DDoS (Distributed Denial of Service) attacks can be challenging to prevent completely, but there are several measures that you can take to minimise their impact. Here are some steps to stop a DDoS attack on your website:

  1. Use a DDoS protection service: Consider using a third-party DDoS protection service to detect and mitigate attacks in real-time.
  1. Increase your server capacity: DDoS attacks can cause your website to become unavailable due to overwhelming traffic. Increasing your server capacity can help your website handle the traffic and remain available during an attack.
  1. Use a CDN (Content Delivery Network): A CDN can help distribute the traffic to multiple servers and reduce the load on your website, making it more resilient to DDoS attacks.
  1. Configure your firewall: Configure your firewall to block traffic from known malicious IP addresses, limit connections from a single IP address, and filter traffic based on specific patterns common in DDoS attacks.
  1. Keep your software up to date: Regularly update your website software, including the operating system, web server, and any third-party applications, to ensure that they are free from known vulnerabilities that could be exploited in a DDoS attack.
  1. Monitor your traffic: Analyze your traffic logs to identify any unusual traffic patterns that could indicate a DDoS attack. Using a monitoring tool can help you detect attacks early and take steps to mitigate them.
  1. Have a DDoS response plan: Develop a DDoS response plan that outlines the steps you will take in the event of an attack. This should include procedures for notifying your hosting provider, engaging a DDoS protection service, and communicating with your users.

What next if attacked?

Resolving a DDoS attack can be challenging, but there are several steps you can take to mitigate its effects: Identify the source of the attack: Determine where the attack is coming from and which systems or machines are being used to launch it. Block traffic from the attacking IPs: Once you know where the attack is coming from, block all traffic from those IP addresses to your network or website. Filter traffic: Apply filters to incoming traffic to identify and block malicious traffic and allow legitimate traffic. Increase server capacity: Add more servers or bandwidth to handle the increased traffic load. Use a Content Delivery Network (CDN): A CDN distributes network traffic across multiple servers, reducing the attack’s impact on any one server. Contact your Internet Service Provider (ISP): Your ISP may have tools or resources to help you mitigate the effects of a DDoS attack. Implement DDoS protection software: Several commercial and open-source options are available to help prevent DDoS attacks.

Remember that preventing DDoS attacks before they occur is the best strategy. It’s important to stay vigilant and keep your security measures up-to-date to reduce the risk of a successful attack.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

Explainer: What does digital violence mean to women in South Sudan?

Digital violence, defined as an act of violence rooted in gender inequality and committed using information and communication technologies or digital media, is a widespread issue facing women globally, with types including cyberbullying, sexting, stalking, grooming, shaming, and doxing; in South Sudan, a lack of specific laws addressing these crimes puts women at even greater risk online.

Writer: Beatrice Amude Paulino

Violence against women is one of the world’s most widespread human rights violations. It results in physical, sexual or mental harm or suffering to women, and its means and tools vary with the passage of time and the growing information and technological revolution.

According to the United Nations Population Fund, online violence or digital violence is defined as an act of violence perpetrated by one or more individuals that are rooted in gender inequality and gendered norms, and that is committed, assisted, aggravated and amplified in part or fully by the use of information and communication technologies or digital media, against a person based on their gender .”

Digital violence is the behaviour that aims at harming or a situation where other users want to impose circumstances that the user is unwilling to or does not consent to in mobile or internet applications. Digital violence can also refer to disruptive online actions, such as cyber-bullying or cyber warfare.

Types of Digital Violence:

Cyberbullying: is psychological harassment, mainly through the media.

Sexting: can be in the form of photos and videos of a sexual form that can be posted online or sent to someone through a phone.

Stalking: is referred to as harassment on any technological platform.

Grooming: is the type of harassment exercised by an adult person towards a child, such as when an adult sexually abuses a child.

Shaming is any action designed to shame the victim, mostly towards women.

Doxing: consists of the action of publishing private information without the person’s consent.

The Characteristics of Digital Violence:

Digital abuse can occur in people of all ages, although it is especially common among teenagers and young people who use smartphones more often. Signs of digital abuse may include but are not limited to intimidation and harassment, surveillance and stalking, sexual coercion, possession and control. 

Levels of Digital Violence against Women in South Sudan:

According to a United Nations Population Fund (UNFPA) study, “ 85% of women globally have been exposed to or experienced some form of online violence, and nearly 40% have experienced it personally.”

Research in 2020 by Plan International, the #freeToBeOnline campaign to protect girls and women online, stated that 14 thousand of girls from 22 countries, including South Sudan, were physically and racially threatened and abused online. The report stated that cyberbullying may contribute to the suicide surge among youth today. But for South Sudan, the young generation engaged both online and offline “might be dying in silence without speaking out.’’

An article by Defyhatenow in February 2021 discusses the issue of physical and cyberbullying in South Sudan, highlighting the lack of specific laws addressing these crimes. The authors cite various sources to support their claims, including research studies and interviews with experts and victims.

Conclusion:

Policymakers should consider taking action to protect women’s rights in digital spaces after acknowledging the potential risks women may face due to digital technology.

The government in South Sudan should ensure the operation of effective women’s protection mechanisms online and safeguarding policies while respecting women’s rights in all settings where women access the digital environment, including the home, offices, education settings, cybercafes, youth centres, libraries, and health care facilities.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

Data Story: South Sudan’s population surges to 12.4 million, reveals 2021 survey

The survey is expected to be an essential resource for the government’s development planning, decision-making, and provision of services as it provides the latest accurate population estimates and other demographic and socio-economic characteristics of the inhabitants.

Writer: Jibi Moses 

The National Bureau of Statistics (NBS) in South Sudan released the Population Estimation Survey 2021 (PES) on April 6th, 2023, revealing a surge in the country’s population to 12.4 million people, a rise of over four million people. The PES 2021 was conducted between May 28th and June 15th, 2021, across ten states and three Administrative areas, with a female population of 52.9% and a male population of 47.1%, while the youth population stands at 77%.

The PES 2021 is expected to be an essential resource for the government’s development planning, decision-making, and provision of services. The survey will monitor the performance of the National Development strategy and the sustainable development goals while providing policymakers with briefs and reference points for research.

With South Sudan’s last census conducted in 2008, the PES 2021 provides the latest accurate population estimates and other demographic and socio-economic characteristics of the inhabitants. The NBS utilised satellite imagery and enumeration to ensure the quality of information and data for the survey met the basic assumptions of the analytic method.

Despite the impact of civil war outbreaks since independence in 2011, the PES 2021 provides a comprehensive and up-to-date representation of South Sudan’s population, enabling policymakers and decision-makers to implement evidence-based planning and decision-making for progress and sustainable development in the country.

The country’s last Census was in 2008, when it was still an autonomous region of Sudan. While releasing the results, Isaiah Chol Aruai, the chairperson of NBS, explained that the figures are based on satellite imagery and enumeration across ten states and three Administrative areas.

The quality of information and data for a given locale, as well as the ability of the data to meet the basic assumptions of the analytic method, are key to performing accurate estimates or projections,” Isaiah Chol Aruai said.

S/No.State/Administrative areaModelled Population Estimates 
1Upper Nile 790,147
2Jonglie 791,105
3Unity 892,780
4Western Bahr El Ghazal 562,555
5Northern Bahr el Ghazal 1,924,342
6Warrap 2,639, 484
7Lakes 1,265, 473
8Western Equatoria 663,233
9Central Equatoria 1,324,521
10Eastern Equatoria 981,902
11Greater Pibor A A240,102
13Ruweng AA234,416
14Abyei133,955
Total12,444,018
Fig 1.0: A table showing the data of the PES 2021 | Source: National Bureau of Statistics 

National statistical offices often produce estimates and projections of various characteristics of a population. These statistics are a vital source of information for decision-makers throughout the government, the private sector, and civil society. An estimate calculates a population’s size or distribution or another population characteristic for the present or past. At the same time, a projection describes these characteristics in the future.

In most countries, policymakers and other data users often require accurate information between census data releases every ten years. Although a full population count only occurs during a census, statistical methods and tools often produce regular, up-to-date population estimates.

Population estimates can describe the population size and demographic characteristics such as age, sex, or education level. Population estimates depend on change’s demographic components: mortality, fertility, and migration.

Estimates of mortality, fertility, and migration estimates are derived from data available from censuses, surveys, registration systems, and other administrative records. Estimates and projections are calculated similarly. However, estimates employ observed data and hypotheses of demographic change when data are incomplete. Projections, on the other hand, rely on hypotheses about demographic change in the future.

One of the most widely used approaches for producing population estimates and projections is the Cohort Component Method, which can be used to calculate detailed statistics such as population by age and sex, total fertility rate, infant mortality rate, and population growth rate. A population may also be estimated and projected for multiple geography units, from the national to various subnational levels (e.g.States, Counties, Districts, Payams, Bomas). 

Figure 2: A bar chart showing the total populations from the ten states and the administrative Areas | Source: Flourish Studio Data Visualization

Fig 3. A stacked bar chart showing the figures of the two most recent population census in 2008 and the PES 2021 | Source: Flourish studio data visualization

Fig 4: A bar chart showing the population percentage between the two censuses, 2008 and PES 2021 | Source: Flourish Studio Data Visualization

Criticisms from the Public:

The PES 2021 report was received with much scepticism and criticism from the public. Individuals and organisations criticised the authenticity of the data. Some voices challenging the report can be found in this article by The East African and an analysis by The Sudd Institute. 

Some opposition politicians and some in the civil society questioned the estimates that put the total of the country’s population to 12,444,018 and are demanding what they term “a proper census” as per the 2018 peace agreement. UN estimates had put the population at 11,556,069 even though the UN itself partly supported the current survey,” reports The East African

Augustino T. Mayai, the Managing Director of the Sudd Institute, an independent research organisation, analysed the scientific, political, and policy implications of the PES results stating that the new estimates are in stark contrast with South Sudan’s 2008 census counts, which stood at 8.26 million, informing the 2010 regional and national elections. These estimates, he says, “…have so far generated heated debates in various quarters, with many outright contesting them for a host of good reasons.”

However, on the 13th of April, NBS clarified that the PES 2021 results should not be used for electoral purposes, Juba Echo, but for planning and policy guidance, such as Something Augustino T. Magai questions.  

‘’…if the PES results cannot be used for electoral purposes, then it is odd to use them

for development. Using the scientifically troubled PES results for development (i.e., 

distributing services) is more problematic than using them for politics. This is because 

development is for the ‘greater good for a greater number of people,’ as should be obvious, 

South Sudan’s politics benefits a select few. Let me illustrate. Suppose the Northern Bahr el Ghazal government constructs 50 new schools in Aweil East based on the current estimates, subsequently recruiting teachers and enrolling students. It then dawns on the government that only ten such schools must be based on actual enrollments. The result then boils down to resources wasted and injustice inflicted on populations that genuinely deserve the services but could not get..,’’ as quoted in his report. 

Conclusion:

Much as the PES 2021 results announced, NBS decried a lot of challenges in bringing out accurate and perfect results; among these, they cited the insecurity in parts of the country, floods that had submerged a lot of the inhabited land areas, lack of resources both financial and human. However, against all odds, they could still get the necessary data.

The PES 2021 results put the current estimated population at 12,446,016, with an increment of 4,186,335 from the 2008 population census, which had the country at 8,260,490. This shows an annual percentage growth of 3.9%. 

The current population of South Sudan is 11,556,786 as of Tuesday, April 25th 2023, based on the latest United Nations data. With 43% of the population below 14, 54%  between 15 – 64 and 3% representing 65 and above.

Population estimates are a vital source of information for decision-makers throughout the government, private sector, and civil society. In most countries, policymakers and other data users often require accurate information between census data releases every ten years. Although a full population count only occurs during a census, statistical methods and tools often produce regular, up-to-date population estimates.

Demographic components such as mortality, fertility, and migration must be considered to ensure the accuracy of population estimates. Estimates of these components are derived from data available from censuses, surveys, registration systems, and other administrative records. The Cohort Component Method is widely used for producing population estimates and projections.

Given the importance of accurate population estimates, it is recommended that South Sudan conducts regular surveys and censuses to ensure policymakers have the necessary information for decision-making. Innovative methods such as satellite imagery and enumeration can enhance the quality of information and data collected during surveys and censuses. Policymakers should prioritise evidence-based planning and decision-making for progress and sustainable development in South Sudan.

This article is part of our data stories work written with the firm belief that factual and data-driven reporting can influence decision-making and public perceptions and educate the audience on public interest issues.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

Fact-check: Is Al Fateh Tower destroyed in Khartoum, Sudan?

No, the claim that the Al Fateh tower was destroyed is false; the image doing the rounds online has been altered.

Writer: Beatrice Amude Paulino

According to a Facebook post by Dalmout Media, the Corinthia Hotel, commonly known as Burj Al Fateh, has been destroyed in the current civil war in Sudan. The page has an audience of 6,500 likes and 2,800 followers and claimed in a post that had already made five shares within 18 hours of circulation.

The same picture was also shared on Twitter here.

Burj Al Fateh, also known as Corinthia Hotel, overlooks Tuti Island, where the Blue and White Nile converge and are shaped to resemble a twin sail. It is one of the city’s most luxurious and atmospheric hotels.

A screenshot of the picture used by Dalwout Media in the post

According to the Google search lens, there is no destruction on the Burj Al Fateh building in Khartoum, Sudan. Still, the image that Dalwout Media uses is an altered picture of the original image of the building. This is because there needs to be evidence from the main and international media like Al Jazeera, who have been following and covering the war from day one.

Some of the views under the Dalwout Media post stated that “The situation is tragic enough without fake photos being used and certainly does not support your credibility.” Rebecca Bradley. This supports the fact that the building wasn’t destroyed. 

AI Fateh Tower, also commonly called Burj AI-Fateh Hotel and Corinthia Hotel, is a five-star hotel located in central Khartoum, the capital of Sudan, the meeting point of the Blue Nile and the White Nile In the centre of Khartoum’s commercial, business and administrative districts.  

A picture of the Burj AL-Fateh Hotel.

Conclusion:

211 Check finds the claim that the war in Sudan has destroyed Burj Al Fateh as false; the image was altered. The picture was randomly collected from the internet to fabricate a story that has yet to occur in Khartoum, Sudan, due to the clashes in Sudan.

Fight misinformation in mainstream and alternative media by not being a victim of fake news. Refrain from sharing content you are unsure about or don’t know where it comes from to prevent spreading false information. For more information on our fact-checking process, visit https://211check.org/ or send us a WhatsApp message at +211 917 298 255 to present a claim. Our team will fact-check it and respond promptly. #FactsMatter

Fact-check: Is this an authentic Facebook page for Minister Josephine Lagu?

No, this is an example of social media scams that steal personal information from unsuspecting public members.

Writer: Jibi Moses 

A Facebook page in the name of Hon Josephine Lagu has sponsored a post and published two advertisements on 23 March 2023 inviting farmers to apply for “funding,” but this is false.

The page with 513 likes and 519 followers was created on 23 March 2023 and is being managed from Kenya according to its transparency information, but claims that the Ministry of Agriculture in South Sudan has received funding to improve agricultural development and mechanisation in a joint venture with the World Bank, International Fund for Agricultural Development, and the  World Food Program. Hon Josephine Lagu is the Minister of Agriculture and Food Security. 

Screenshot of the Facebook page transparency information

“This program aims to modernise agriculture and increase productivity. The funds will be used to purchase agricultural machinery for farmers to increase mechanisation and productivity. Farmers are invited to indicate the necessary agricultural equipment to modernise their farming operations and mechanize for agricultural productivity. Enterprises that hire farm equipment to farmers are also encouraged to apply,” partly reads the sponsored Facebook advertisement

A screenshot from the Facebook page 

Investigation:

The advert is linked to a Google Form, which requires the applicant to fill in his /her details and the type of assistance needed.  The personal information required is the applicant’s name, contact details and location. 

This advert is a typical example of social media scams that intend to steal people’s details for them to use for their personal gains. Hackers use this trick to dupe people into giving out their personal details. 

The Ministry of Agriculture and Food Security does not run such programs. Recently, similar adverts have been running using government ministries and individuals claiming to be giving loans and assistance in many ways, as seen here,  here, and here.  

Conclusion:

211 Check finds the claim that Josephine Lagu, South Sudan’s minister for agriculture and food security through her Facebook page, is calling for the public to apply for farming assistance false. The Facebook page on which the advert is running does not belong to the minister herself hence the call for application is ‘just a social media scam

Fight misinformation in mainstream and alternative media by not being a victim of fake news. Refrain from sharing content you are unsure about or don’t know where it comes from to prevent spreading false information. For more information on our fact-checking process, visit https://211check.org/ or send us a WhatsApp message at +211 917 298 255 to present a claim. Our team will fact-check it and respond promptly. #FactsMatter