BusinessToday Previous Editions

BUSINESS TODAY 2 June 2022

Issue link: https://maltatoday.uberflip.com/i/1469602

Contents of this Issue

Navigation

Page 10 of 11

5.12.19 11 Alexiei Dingli OPINION 2.6.2022 Prof Alexiei Dingli is a Professor of AI at the University of Malta and has been conducting research and working in the field of AI for more than two decades, assisting different companies to implement AI solutions. He forms part of the Malta.AI task-force, set up by the Maltese government, aimed at making Malta one of the top AI countries in the world Did your child fall into slavery? SLAVERY is an alien concept to most of us. We consider it a dark chapter of human history that closed many dec- ades ago. Yet, there are many victims of slavery these days, and some of them might be closer to us than we think. I'm not talking here about metaphoric slav- ery, like the attachment to digital de- vices, but the real one, which can harm and affect the well-being of our loved ones for the rest of their lives. Let me delve further into the issue. When we give our children a mobile device, tablet or any other digital means through which they can connect to the internet, we are automatically exposing them to various dangers. Remember, they do not understand how the real world works. Even though we warn them, their notion of good and evil is still forming, and they might not recog- nise suspicious threats. Furthermore, don't forget that cybercriminals go to great lengths to conceal their move- ments until, most of the time, it is too late to turn back. Young children are also easily influenceable, thus, making them effortless prey for these preda- tors. To understand what I mean, imagine taking your underage child and leaving him in a dodgy area of town where il- licit activity is rampant. No one would do that, yet we are comfortable giv- ing them a digital device that opens a window over the world. It lets them go anywhere they like, even in these dan- gerous zones. We should wake up and realise what we're allowing to happen before it is too late. Let me illustrate how easy it is for vulnerable children to fall inside the rabbit hole. A child is playing online through his favourite game. Suddenly, he receives a chat request from LittleTom, someone he doesn't know. But LittleTom seems like a reference to a boy, a child of prob- ably similar age, so he doesn't think twice and accepts the request. LittleT- om starts a conversation on very inno- cent things. He relates his day at school, how he fought with his best mate and how sad he was feeling at that moment. Of course, everyone exposed to such conversation would feel pity for him, so the conversation continued. But Lit- tleTom seems like a helpful person too; he even helped him with his homework! As the chat proceeds, the children exchanges more personal information like the siblings' names, where they live, which school they attend, etc. Since they've become such good friends af- ter talking for a few minutes, LittleTom decides to share something cool with his new buddy, so he sends him a link. As soon as the child presses the link, a prompt pops up where he has to enter his Microsoft Teams password. ere's nothing strange there; he's used to it now after all those online lessons! He logs in, but the system asks him to in- stall an update and won't allow him to proceed before he does it. So he presses "Ok". What just happened here? LittleTom first used his social engineering skills to befriend the child. He played the sympathy card by relating a sad sto- ry that anyone can relate to. en he even helped him with his homework difficulties, thus gaining his trust. So when LittleTom shared the link, the boy didn't think twice about clicking it. e Microsoft Teams interface was fake, a kind of cyberattack called phish- ing where the cybercriminal gets hold of the username and password of the child. Now LittleTom gained access to the child's school records. His details, address, friends, school, grades, prac- tically everything. e update was a scam, too; it installed a Trojan, a virus that gives LittleTom access to the child's computer. By doing so, he also acquired access to the child's photos, videos, and digital secrets. From now on, LittleTom has two op- tions. If he finds something compro- mising, even just a photo in a swimsuit, he'll use those to threaten the child with sharing them online. Otherwise, he'll resort to violence, telling him that he knows his address and will hurt his loved ones. e child knows that he shouldn't have spoken with strangers, so he automatically feels in trouble. Furthermore, he doesn't want anything bad to happen to his family, so he plays along. Officially, the child becomes enslaved. e requests from LittleTom start slow- ly with innocent shots up to full nude pictures, some of which even portray sexual acts. And the more photos the child send, the more difficult it is for him to get out of the hole he's digging. is experience will, of course, affect the child's social and psychological well-being; it will mark him for life and, in some cases, even lead to contemplat- ing suicide. If you feel that this is farfetched and will never happen to you, think again! South Korea had a massive case in 2020 which included 103 victims, 26 of which mi- nors. e criminals used blackmailing to spread and traffic sexually exploit- ative videos. e market is very ripe for this material; consider that, in this case, 60,000 users bought these photos online. So even though these criminals are now behind bars, many others lurk in the digital shadows. Be vigilant about your kids' online activity. Don't assume that an innocent game cannot become a vehicle for sordid preditors, and reas- sure your children that even when they make mistakes, you'll always have their back and be there to help them out no matter what.

Articles in this issue

Links on this page

Archives of this issue

view archives of BusinessToday Previous Editions - BUSINESS TODAY 2 June 2022