Tag Archives: online harassment

Philip Grindell, Reputation Communications Interview

Philip Grindell, was a Scotland Yard Detective for London’s Metropolitan Police when Jo Cox, a British politician and Member of Parliament, was murdered. He set up the Metropolitan Police team to mitigate such risks, introducing best practices from across the world. In 2019, he retired from the Police and set up Defuse to protect family/executive offices, high-profile individuals and well-known brands from targeted and fixated physical, reputational & financial harm on social media and the dark web.

Now, working alongside a team of experts, he brings the same level of intelligence and counsel to high-profile individuals, organizations and their teams who are dealing with or want to prevent abuse, threats, or a high-risk situation. Defuse is based in London and serves clients internationally, from the Middle East to the U.S. We interviewed him to get the state-of-the-moment take on what you need to know when you fall into that group.

What sparks public figures to reach out to you?

Receiving abuse, a death threat or feeling like their safety might be in jeopardy. But most genuine threats are not direct. Often, they are subtle.

We understand how to identify serious threats from false ones. There are many social media users who are fixated on celebrities, politicians and a range of other high-profile types. When you are the subject of such focus, you understandably become increasingly anxious, fearful and confused about these interactions. It is hard to to identify who the communicators are, whether they pose a threat and how to manage the communications.

This uncertainty compounds the fear, frustration and the lack of control our clients’ experience.

How do you evaluate the level of risk of such threats?

In general, those who threaten often do not actually pose a threat. There has been significant research into this, initiated by Defuse’s special advisor, Dr Robert Fein. Dr Fein was tasked by the US Secret Service to review all attacks and attempted attacks on prominent public officials in the United States since 1949.

It is important to understand the signs of cyberstalking as it can escalate into a particularly dangerous behavior. This is especially true with ‘celebrities’ with whom stalkers may start as fans and then turn dangerous when the stalker’s expectations are not met.
An indication of this may be a sudden change in their behavior, making a physical approach or starting to communicate via different channels, such as moving from social media to phone calls, or emails or multiple methods.

How does Defuse combat online abuse?

The very first task of a security specialist when tackling online abuse is to analyze whether the individual receiving online abuse is in any physical danger. Most online abusive posts are not going to lead to a physical attack, but remain deeply hurtful, at times frightening and often corrosive.

Many who are repeatedly targeting high profile people can have associated mental health challenges. Each case requires a particular response bespoke to its circumstances. To ensure that the response is the correct one, a more forensic approach is required. One size does not fit all! By psychoanalyzing the communications it’s possible to identify specific personality issues, which can then direct the response.

If you are considering an intervention, it is vital that this is supported by analysis and if appropriate some form of surveillance be that online or physical. It is crucial that any sudden change of behavior is quickly identified, and the appropriate security measures considered.

In your media interviews, you’ve said women are the most common targets of online harassment.

Yes. In a Daily Mail interview, I was quoted as saying: ‘Anyone in the public eye can become a target for online abuse but women are attacked in a very personal way.” I believe misogyny should be made a hate crime.

In a recent blog post, you also warned about an increase in threats to C-Suite-level executives and CEOs.

Due to the daily reports of COVID-related job loss and loss of bonuses, Defuse predicts an escalation of personal threats to CEOs and C-Suite executives.

Most targeted campaigns are by fixated persons, such as those suffering from deteriorating mental health or activists, and they usually start from a grievance such as being dismissed from their job. A grievance can quickly escalate along what we call a ‘pathway to violence’. The targets of this hostility are escalating risks to CEOs, other members of the C-Suite HR executives and their families. While the most visible reports concern social media abuse, less well publicized are personal threats communicated via emails, forums and letters.

Personal reputation attacks are also likely. The ‘cancel culture’ is destroying reputations, careers and organizations almost overnight. Those targeted may suffer fear, anxiety and diminishing performance. Organizations should recognize and support those targeted and have confidential solutions readily available to deploy.

There are a number of ‘red flags’ that will be apparent but are often ignored often because they can be counterintuitive. The key is to differentiate those who make threats from those who pose them.
*
Philip Grindell is one of the UK’s most trusted advisors when it comes to fixated persons and national security issues. He was called in to serve in Parliament while serving as a Scotland Yard Detective for Metropolitan Police investigations, a role he held for almost 30 years, including time spent seconded to British Intelligence on Counter-Terrorist investigations.

He was also employed as a Counter-Terrorism Security Coordinator to ensure that high profile events, including Royal and Government events, were safe from terrorist attacks with detailed contingency plans. His background also includes threat intelligence, risk management, protective security, and expertise in analyzing and predicting the behavior of stalkers.

This article is part of our continuing series of interviews with experts whose work relates to online reputation management.

 
 
Arun Rao, IGI

Online personal and reputational attacks, threats and disparagement, unfounded allegations, disinformation campaigns, impersonation schemes, disturbing online threats, and harassment are not the type of risks many of you encounter online.

However, they are potential threats if you are a prominent or high net worth individual … or if you are a profitable business or high-profile organization. Investigative Group International, Inc., known as IGI, is famous in Washington, D.C. circles and beyond for its proprietary sources and methods used to identify the perpetrators of such campaigns … and then mitigate them.

Founded in 1984 by former Senate Watergate Committee counsel Terry F. Lenzner, IGI is a risk advisory and corporate investigations firm described by The Washington Post as “legendary for its ‘opposition research probes.’” IGI provides several services, but its Reputation Defense offensive is the most relevant for our clients.

With that in mind, we interviewed Arun G. Rao, President of IGI, on what you need to know if you or your organization become the focus of such attacks.

What types of IGI clients use your Reputation Defense services?

In the corporate sector, we serve companies involved in healthcare, entertainment, energy, finance, news, higher education, and other industries. In the personal sector, we assist high net worth individuals, prominent public figures (including elected officials and candidates for public office, as well as entertainers) and their family members.

What is most surprising to the clients you serve?

Individual clients often are surprised by the extent of sensitive and detailed personal information available about them online – especially people with children and close family members who are active on social media.

Corporate clients have been surprised, at times, to discover the true identities of the forces arrayed against them. Through our investigative work, we frequently establish that seemingly discrete and unrelated actions are, in fact, part of coordinated campaigns designed to undermine business initiatives. 

Many clients come to us with misinformation or misunderstandings about the feasibility and strategic advisability of changing or removing internet content.  Certain steps may improve privacy and promote safety, but other actions that clients might be contemplating may serve only to exacerbate the problem.  We strive to ensure that our clients understand all of the risks and benefits of potential courses of action, so that they are properly informed about the range of options available.

Can you provide insight into the kind of issues you help your clients navigate?

Companies often find themselves simultaneously facing multiple serious crises at the same time – for example, Congressional hearings, pending government regulatory action, class action lawsuits, negative press coverage, public protests, or calls for a boycott.

In some cases, such events may stem from, or be driven and accelerated by, a coordinated disinformation campaign being waged against them. In those situations, we work to identify and profile the various actors arrayed against our client and to expose the sometimes-hidden connections and collusion among them.

More than once, a self-proclaimed “consumer watchdog group” has turned out to be a front for plaintiffs’ attorneys who are recruiting litigants. And purportedly “grassroots” activists or advocacy groups sometimes are funded by moneyed interests adverse to our client for their own reasons.

We also have encountered cases where complaints filed with law enforcement about a client’s business practices have been made in bad faith by agents of a competing business. Similarly, regulatory action or negative publicity might have been initiated by a dossier of negative or misleading information circulated by short-sellers trying to drive down our client’s share price.

For example, we assisted a company targeted by short-sellers who generated bad publicity —based upon false allegations — to drive down the client’s stock price. They masqueraded as journalists, collaborated with a competitor company, initiated false claims, and generally created havoc that mystified the company until they called us. Through our research, we were able to identify the bad actors and their coordinated disinformation campaign and take steps to expose their activities and place them on the defensive.

Entertainers, political figures, and high net worth individuals

Prominent political figures are often subject to false allegations – particularly during hard-fought campaigns. The candidate and their trusted staff members often know in advance from where such false claims are likely to arise. We can proactively prepare to combat such claims before a media crisis ensues.  In a recent engagement, we were able to discreetly obtain verifiable facts demonstrating that certain claims circulating on fringe platforms were false. As a result of our research major mainstream media outlets – recognizing the falsity of the allegations in question – were dissuaded from amplifying them.  

Aside from our political work, we also have provided related services to high net worth individuals. For example, the chief executive officer of a U.S. company retained IGI when a then-unknown individual impersonated the client online, in an effort to disparage the client.  We were able to identify the culprit and assist with content removal.  In another case, a member of a prominent family in the entertainment industry was targeted by conspiracy theorists who falsely claimed that the family member was participating in illegal activities. They attempted to publicize this “fake news” on various social media platforms.  In addition to baselessly maligning the family member’s reputation, this posed a potential security risk – as we have seen in recent years, conspiracy theorists sometimes act not just from behind a computer screen, but, on occasion, in the physical world as well.  We helped identify and locate the bad actors, remove personal identifying information and images from the internet, and coordinate residential security briefings to provide the client with peace of mind. 

Summary

We conduct most of our reputation defense engagements in two broad phases: first, researching and gathering information, and second, responding to the threat.

In today’s climate, accusations against an individual or a company – even if wholly unfounded or merely alleged – may trigger a public relations crisis which, when amplified and multiplied on the internet, can escalate into an existential threat. Sometimes a company’s size alone, its role as an innovator or disruptor, or its bid to enter a new market can make it a target for the unscrupulous.

The sooner clients reach out to us, the better. With early assessment or intervention, we are able to remove the threat and minimize the risks and damage. Situations involving reputation defense can escalate quickly. Once that occurs, it can take significantly more time and resources to resolve.

*

Arun G. Rao

As President of IGI, Arun G. Rao directs due diligence and corporate internal investigations, and advises clients on crisis and risk management.

Previously he served as Chief of the Southern Division of the U.S. Attorney’s Office for the District of Maryland. He was a Deputy Associate Counsel in the Office of the White House Counsel from 2012 to 2013. He joined the U.S. Department of Justice in 2007 as an Assistant U.S. Attorney in the U.S. Attorney’s Office for the Western District of Tennessee. Prior to that he was an Assistant District Attorney in the New York County District Attorney’s Office and an associate at Cravath, Swaine & Moore LLP in New York, New York. Rao graduated from the University of Virginia in 1998 and received his J.D. in 2001 from the New York University School of Law. He is an adjunct professor of law at Georgetown University Law Center.

This is part of our continuing series of interviews with experts whose work relates to online reputation management.

 

 
 
Managing online harassment

Paul Sullivan, the “Wealth Matters” columnist for The New York Times, has published an article detailing an online harassment campaign that resulted in a rare jail sentence for the businessman who masterminded it.

He paints a revealing picture about how fake blogs were created to post false, defamatory information designed to ruin the reputation of a respected hedge fund manager. Like so many such campaigns, it was planned as retaliation for a perceived wrong.

It started in 2014, when the perpetrator asked a blogger to launch a “negative internet P.R.” campaign. He directed him to use search strategies that would produce the articles when people searched for the target’s name. He also paid him to use online services to send out press releases containing the false information, then “contacted someone who specialized in ranking negative articles high in searches, asking for assurances that the campaign would keep the negative articles visible.”

Over the years, the articles spread across the internet and came up high in searches, creating substantial reputational harm to their target. After spending “several million dollars on legal bills and security experts,” and filing a court case, he won. The wrongdoer — who faced $2 million in legal bills for the criminal and related trials — was sentenced to nine months in a county jail for criminal harassment.

Related reading: An Attorney’s Advice for Removing Negative, Defamatory and Infringing Material from the Internet, by Christine Rafin, Esq.

What to Do When You Are the Victim of Online Defamation, By David Klein, Esq. & Christine Rafin, Esq.

Internet Legal Issues, our archive 

 
 

The December issue of Security Management magazine features an article by Interfor International COO Don Aviv and me about the importance of social media policies. A few key points:

“In 2016, public consumers were nearly twice as likely to recall a company’s social media campaign as to recall a print advertisement. That’s good news for social media, but bad news for any organization experiencing a crisis there.

“Employers should define what is prohibited conduct on social media—such as offensive, demeaning, defamatory, discriminatory, harassing, abusive, inappropriate, or illegal remarks, as well as personal gripes.

“Whether employees are the cause, source, or target of such issues, understanding and amplifying your organization’s social media policy is as essential as having both IT and legal on speed dial.”

You can read a longer excerpt here: A New Social World.

Related Reading: How to Create Effective Social Media Policies.

 

 
 
General Data Protection Regulation

The Anti-Defamation League (ADL) has hired its first director of technology and society, Brittan Heller, to collaborate with tech companies to combat online harassment. It’s an important step for helping companies stop online abuse.

In this excellent New York Times interview by Anna North, Ms. Heller offers advice for others dealing with harassment online:

Part of the power that the harassers have is they like to make people feel isolated, and sometimes part of the ongoing harm of these kind of crimes is that you feel like there’s no meaningful way for you to fight back, there’s no way for you to adequately speak out against what’s happening to you.

I would not let the harassment take your voice away. You can talk to family, teachers and friends about what you’re experiencing and what you’ve seen. You can be a support for other people experiencing the same thing, and you can call out people who are trying to incite hate online. Also, educate yourself. Look at the terms of service or community guidelines for the type of platforms and social media that you’re using, and find out what kind of site that company wants to run. Most say that they don’t wish to host hateful content.”

ADL’s website publishes extensive resources at Combating Hate, including best practices for responding to cyber abuse. Additional information is available at Stop Cyberbullying, a Federal government website.