<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>open thinking</title>
	<atom:link href="https://educationaltechnology.ca/feed/" rel="self" type="application/rss+xml" />
	<link>https://educationaltechnology.ca</link>
	<description>rants &#38; resources from an open educator</description>
	<lastBuildDate>Sun, 23 Jul 2017 04:05:02 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://educationaltechnology.ca/wp-content/uploads/2015/12/cropped-cropped-LOGO-32x32.png</url>
	<title>open thinking</title>
	<link>https://educationaltechnology.ca</link>
	<width>32</width>
	<height>32</height>
</image> 
	<copyright>2006-2007 </copyright>
	<managingEditor>couros@gmail.com (open thinking)</managingEditor>
	<webMaster>couros@gmail.com (open thinking)</webMaster>
	<ttl>1440</ttl>
	<image>
		<url>http://educationaltechnology.ca/couros/images/openthinking_podcast_logo.png</url>
		<title>open thinking</title>
		<link>https://educationaltechnology.ca</link>
		<width>144</width>
		<height>144</height>
	</image>
	<itunes:subtitle></itunes:subtitle>
	<itunes:summary>Open, Connected &#38; Social</itunes:summary>
	<itunes:keywords></itunes:keywords>
	<itunes:category text="Society &#38; Culture" />
	<itunes:author>open thinking</itunes:author>
	<itunes:owner>
		<itunes:name>open thinking</itunes:name>
		<itunes:email>couros@gmail.com</itunes:email>
	</itunes:owner>
	<itunes:block>no</itunes:block>
	<itunes:explicit>no</itunes:explicit>
	<itunes:image href="http://educationaltechnology.ca/couros/images/openthinking_podcast_logo.png" />
	<item>
		<title>6th Annual NJ GAFE Summit &#8211; Fake News</title>
		<link>https://educationaltechnology.ca/2807/</link>
					<comments>https://educationaltechnology.ca/2807/#comments</comments>
		
		<dc:creator><![CDATA[Alec]]></dc:creator>
		<pubDate>Sun, 23 Jul 2017 04:05:02 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[edtechteam]]></category>
		<category><![CDATA[fakenews]]></category>
		<category><![CDATA[infolit]]></category>
		<guid isPermaLink="false">http://educationaltechnology.ca/?p=2807</guid>

					<description><![CDATA[Next week, Iâ€™ll be attending the 6th annual New Jersey GAFE summit. In addition to facilitating a few workshops, Iâ€™m also very honoured to have been invited to deliver the opening keynote at the event. My presentation, titled Developing critical &#8230; <a href="https://educationaltechnology.ca/2807/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Next week, Iâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />ll be attending the </span><a href="https://nj.gafesummit.com/2017"><span style="font-weight: 400;">6th annual New Jersey GAFE summit</span></a><span style="font-weight: 400;">. In addition to facilitating a few workshops, Iâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />m also very honoured to have been invited to deliver the opening keynote at the event. My presentation, titled </span><i><span style="font-weight: 400;">Developing critical literacies: What students need to know in a â€œfake newsâ€ world</span></i><span style="font-weight: 400;">, addresses what I see as one of the key challenges facing educators today: preparing students to survive and thrive in our </span><a href="https://en.oxforddictionaries.com/word-of-the-year/word-of-the-year-2016"><span style="font-weight: 400;">post-truth</span></a><span style="font-weight: 400;"> reality.</span></p>
<p><span style="font-weight: 400;">In anticipation of this event, Iâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />ve compiled a small collection of key readings, viewings, and other resources on the <a href="https://padlet.com/courosa/njsummit">Padlet found below</a>.</span></p>
<div class="padlet-embed" style="border: 1px solid rgba(0,0,0,0.1); border-radius: 2px; box-sizing: border-box; overflow: hidden; position: relative; width: 100%; background: #F4F4F4;">
<p style="padding: 0; margin: 0;"><iframe style="width: 100%; height: 608px; display: block; padding: 0; margin: 0;" src="https://padlet.com/embed/dhd7ejjqvp0h" width="300" height="150" frameborder="0"></iframe></p>
<div style="padding: 8px; text-align: right; margin: 0;"><a style="padding: 0; margin: 0; border: none; display: block; line-height: 1; height: 16px;" href="https://padlet.com?ref=embed" target="_blank" rel="noopener"><img decoding="async" style="padding: 0; margin: 0; background: none; border: none; display: inline;" src="https://resources.padletcdn.com/assets/made_with_padlet.png" alt="Made with Padlet" width="86" height="16" /></a></div>
</div>
<p><span style="font-weight: 400;">Iâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />d love for you to take some time to explore the information collected on the Padlet and then to think about how you might start to address the issue of fake news in your own school context. Then, please take a few moments to respond, by commenting on this post OR by submitting your own video response to the <a href="https://flipgrid.com/5c154c">Flipgrid below</a>. Even if you wonâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t be attending the New Jersey summit, Iâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />d still love to hear your thoughts on this important issue in education!</span></p>
<p><iframe src="https://flipgrid.com/5c154c/?embed=true" width="600" height="800" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
]]></content:encoded>
					
					<wfw:commentRss>https://educationaltechnology.ca/2807/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What Kind of (Digital) Citizen?</title>
		<link>https://educationaltechnology.ca/2804/</link>
		
		<dc:creator><![CDATA[Alec]]></dc:creator>
		<pubDate>Mon, 05 Jun 2017 22:27:00 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[activecitizenship]]></category>
		<category><![CDATA[citizenship]]></category>
		<category><![CDATA[digcit]]></category>
		<category><![CDATA[digciz]]></category>
		<category><![CDATA[digitalcitizenship]]></category>
		<category><![CDATA[digitalidentity]]></category>
		<category><![CDATA[edchat]]></category>
		<category><![CDATA[edtech]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[westheimer]]></category>
		<guid isPermaLink="false">http://educationaltechnology.ca/?p=2804</guid>

					<description><![CDATA[This post was co-written with Katia HildebrandtÂ and also appears on her blog. This week (June 5-11) weâ€™ll be hosting a couple of events and activities related to digital citizenship as part of a series of DigCiz conversations. Specifically, weâ€™d like &#8230; <a href="https://educationaltechnology.ca/2804/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><em><span style="font-weight: 400;">This post was co-written with <a href="http://katiahildebrandt.ca/what-kind-of-digital-citizen/">Katia Hildebrandt</a>Â and also appears on her blog.</span></em></p>
<p><span style="font-weight: 400;">This week (June 5-11) weâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />ll be hosting a couple of events and activities related to </span><a href="http://www.digitalcitizenship.net/"><span style="font-weight: 400;">digital citizenship</span></a><span style="font-weight: 400;"> as part of a </span><a href="http://digciz.org/schedule/"><span style="font-weight: 400;">series</span></a><span style="font-weight: 400;"> of </span><a href="http://digciz.org/about/"><span style="font-weight: 400;">DigCiz conversations</span></a><span style="font-weight: 400;">. Specifically, weâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />d like to deepen the discussion around digital citizenship by asking how we might move from a model of personal responsibility (staying safe online) to one that takes up issues of equity, justice, and other uncomfortable concepts. That is, we want to think about what it might look like to think about </span><i><span style="font-weight: 400;">digital</span></i><span style="font-weight: 400;"> citizenship in a way that more closely resembles the way we often think about citizenship in face-to-face contexts, where the idea of being a citizen extends beyond our rights and also includes our responsibility to be active and contributing members of our communities. Of course, thatâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s not to say that face-to-face citizenship is by default more active, but we would argue that we tend to place more emphasis on active citizenship in those settings than we do when we discuss it in its digital iteration.</span></p>
<p><span style="font-weight: 400;">So&#8230;in order to kick things off this week, we wrote this short post to provide a bit more background on the area weâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />ll be tackling.</span></p>
<p><b>Digital Citizenship 1.0: Cybersafety</b></p>
<p><span style="font-weight: 400;">The idea of digital citizenship is clearly influenced by the idea of â€œCybersafety,â€ which was the predominant framework for thinking about online behaviours and interactions for many years (and still is in many places). This model is focused heavily on what </span><i><span style="font-weight: 400;">not </span></i><span style="font-weight: 400;">to do, and it relies on scare-tactics that are designed to instill a fear of online dangers in young people. This video, titled â€œEveryone knows Sarah,â€ is a good example of a cybersafety approach to online interactions:</span></p>
<p><iframe loading="lazy" title="Internet Danger- Everyone Knows Sarah" width="584" height="438" src="https://www.youtube.com/embed/ThxmgXMBpoM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><span style="font-weight: 400;">The cybersafety approach is problematic for a number of reasons. We wonâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t go into them in depth here, but they basically boil down to the fact that students arenâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t likely to see PSAs like this one and then decide to go off the grid; </span><a href="https://thesocietypages.org/cyborgology/2011/02/24/digital-dualism-versus-augmented-reality/"><span style="font-weight: 400;">the digital world is inseparable from face-to-face contexts</span></a><span style="font-weight: 400;">, especially for todayâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s young people who were born into this hyper-connected era. So this is where digital citizenship comes in: instead of scaring kids offline or telling them what not to do, we should support them in doing good, productive, and meaningful things online. </span></p>
<p><b>From Cybersafety to Digital Citizenship</b></p>
<p><span style="font-weight: 400;">Luckily, in many spheres, we have seen a shift away from cybersafety (and towards digital citizenship) in the last several years, and this shift has slowly found its way into education. In 2015, we were hired by our provinceâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s Ministry of Education to create a planning document to help schools and districts with the integration of the digital citizenship curriculum. The resulting guide, </span><i><span style="font-weight: 400;">Digital Citizenship Education in Saskatchewan Schools</span></i><span style="font-weight: 400;">, can be found </span><a href="http://publications.gov.sk.ca/documents/11/83322-DC%20Guide%20-%20ENGLISH%202.pdf"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">. In the guide, we noted:</span></p>
<blockquote><p><span style="font-weight: 400;">â€œDigital citizenship asks us to consider how we act as members of a network of people that includes both our next-door neighbours and individuals on the other side of the planet and requires an awareness of the ways in which technology mediates our participation in this network. It may be defined as â€˜</span><a href="http://www.digitalcitizenship.net/Home_Page.php"><span style="font-weight: 400;">the norms of appropriate and responsible online behaviour</span></a><span style="font-weight: 400;">â€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> or as â€˜</span><a href="http://teachthought.com/the-future-of-learning/digital-citizenship-the-future-of-learning/the-definition-of-digital-citzenship/"><span style="font-weight: 400;">the quality of habits, actions, and consumption patterns that impact the ecology of digital content and communities</span></a><span style="font-weight: 400;">.â€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />â€</span></p></blockquote>
<p><span style="font-weight: 400;">In the </span><i><span style="font-weight: 400;">Digital Citizenship Guide</span></i><span style="font-weight: 400;">, we also underlined the importance of moving from a fear- and avoidance-based model to one that emphasizes the actions that a responsible digital citizen should take. For instance, we suggested that schools move away from â€œacceptable useâ€ policies (which take up the cybersafety model) and work to adopt â€œresponsible useâ€ policies:</span></p>
<p><a href="http://katiahildebrandt.ca/wp-content/uploads/2017/06/83322-DC_Guide_-_ENGLISH_2_pdf.png"><img loading="lazy" decoding="async" class=" wp-image-462 aligncenter" src="http://katiahildebrandt.ca/wp-content/uploads/2017/06/83322-DC_Guide_-_ENGLISH_2_pdf-300x186.png" alt="" width="399" height="253" /></a></p>
<p><b>Moving Beyond Personal Responsibility</b></p>
<p><span style="font-weight: 400;">While the move from cybersafety to digital citizenship has helped us to shift the focus away from what not to do online, there is still a tendency to focus digital citizenship instruction on individual habits and behaviours. Students are taught to use secure passwords, to find a healthy balance between screen time and offline time, to safeguard their digital identity. And while all of these skills are important pieces of being a good digital citizen, they revolve around protecting oneself, not helping others or contributing to the wider community.</span></p>
<p><span style="font-weight: 400;">So weâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />d like to offer a different model for approaching the idea of citizenship, one that moves beyond the individual. To do this, we have found it helpful to think about citizenship using </span><a href="http://www.democraticdialogue.com/DDpdfs/WhatKindOfCitizenAERJF.pdf"><span style="font-weight: 400;">Joel Westheimerâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s framework</span></a><span style="font-weight: 400;">. Westheimer distinguishes between three kinds of citizens: the personally responsible citizen, the participatory citizen, and the justice oriented citizen. The table below helps to define each type.</span></p>
<div id="attachment_463" style="width: 409px" class="wp-caption aligncenter"><a href="http://katiahildebrandt.ca/wp-content/uploads/2017/06/WhatKindOfCitizenAERJF_pdf.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-463" class=" wp-image-463" src="http://katiahildebrandt.ca/wp-content/uploads/2017/06/WhatKindOfCitizenAERJF_pdf-279x300.png" alt="" width="399" height="428" /></a><p id="caption-attachment-463" class="wp-caption-text">Table taken from Westheimerâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s 2004 article, linked above.</p></div>
<p><span style="font-weight: 400;">Using this model, we would argue that much of the existing dialogue around digital citizenship is still heavily focused on the personally responsibility model. Again, this is an important facet of citizenship &#8211; we need to be personally responsible citizens as a basis for the other types. But this model does not go far enough. Just as we would argue that we need participatory and justice-oriented citizens in face-to-face contexts, we need these citizens in online spaces as well.</span></p>
<p><span style="font-weight: 400;">So hereâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s our challenge this week: Is there a need to move beyond personal responsibility models of digital citizenship? And if so, how can we reframe the conversation around digital citizenship to aim towards the latter two kinds of citizen? How might we rethink digital citizenship in order to encourage more active (digital) citizenship and to begin deconstructing the justice and equity issues that continue to negatively affect those in online spaces, particularly those who are already marginalized in face-to-face contexts? And what are the implications of undertaking this shift when it comes to our individual personal and professional contexts, especially when it comes to modelling online behaviours and building (digital) identities/communities with our students?</span></p>
<p><span style="font-weight: 400;">These are big questions, and we certainly donâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t have the answers yet &#8211; so weâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />d love to hear from you! Please consider commenting/responding in your own post, or come join us as we unpack these complex topics during the events listed below.</span></p>
<p><span style="font-weight: 400;">This weekâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s events:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">On Tuesday, June 6 at 3 pm EDT, we will be hosting a webinar to discuss this weekâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s topic. If you are interested in being a panelist, please email us at </span><a href="mailto:alecandkatia@gmail.com"><span style="font-weight: 400;">alecandkatia@gmail.com</span></a><span style="font-weight: 400;"> &#8211; weâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />d love to have you join us! The Webinar will take place via </span><a href="https://zoom.us/"><span style="font-weight: 400;">Zoom.Us</span></a><span style="font-weight: 400;"> &#8211; to join as an attendee, just </span><a href="https://zoom.us/j/657948972?pwd=nC-ca2LAWx0"><span style="font-weight: 400;">click this link</span></a><span style="font-weight: 400;">.</span></li>
<li style="font-weight: 400;">On Wednesday, June 7 at 8 pm EDT, we will be moderating a Twitter chat with a number of questions related to this weekâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s topic. To join, please connect with us on Twitter (<a href="http://twitter.com/courosa"><span style="font-weight: 400;">@courosa</span></a><span style="font-weight: 400;"> and </span><a href="http://twitter.com/kbhildebrandt"><span style="font-weight: 400;">@kbhildebrandt</span></a><span style="font-weight: 400;">) and follow the </span><a href="https://twitter.com/search?f=tweets&amp;vertical=default&amp;q=%23digciz&amp;src=typd"><span style="font-weight: 400;">#DigCiz hashtag</span></a><span style="font-weight: 400;">.</span></li>
</ul>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mario Couros Memorial Bursary</title>
		<link>https://educationaltechnology.ca/2795/</link>
					<comments>https://educationaltechnology.ca/2795/#comments</comments>
		
		<dc:creator><![CDATA[Alec]]></dc:creator>
		<pubDate>Tue, 24 Jan 2017 03:42:44 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<guid isPermaLink="false">http://educationaltechnology.ca/couros/?p=2795</guid>

					<description><![CDATA[Hey everyone &#8211; I&#8217;m really hoping that you can support the following with your direct contribution or by sharing this far and wide. Back in January of 2013, I initiated a massive open online course about edtech called #etmooc. It &#8230; <a href="https://educationaltechnology.ca/2795/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hey everyone &#8211; I&#8217;m really hoping that you can support the following with your direct contribution or by sharing this far and wide.</p>
<p>Back in January of 2013, I initiated a massive open online course about edtech called <a href="http://etmooc.org">#etmooc</a>. It was an amazing experience for me, and perhaps most significantly, it introduced to me to a group of amazing, passionate individuals who have continued to learn and connect since the early days of the course.</p>
<p>These individuals have not only been great supporters of open and networked learning, they are also incredibly caring individuals who have demonstrated immense charity and kind regard for others.</p>
<p>As many of you may remember, the day after the lastÂ <a href="http://etmooc.org">#etmooc</a> session, my father Mario passed away unexpectedly.Â <a href="http://etmooc.org">#etmooc</a> participants and so many others in my network were there for me to provide their sincere condolences and support in my greatest time of need. I know that we often see the shallowness of social media connections, but I am fortunate to have experienced deep caring and friendship in these spaces.</p>
<p>About a year ago, the group ofÂ <a href="http://etmooc.org">#etmooc</a> alumni surprised me with an incredible gift. They initiated a bursary at the <a href="http://www.uregina.ca">University of Regina</a> (my place of employment) in memory of my father. Befitting the fact that my parents immigrated to Canada in the 1950â€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s, the Mario Couros Bursary has been set up specifically to support the post-secondary education of a new Canadian who is looking to enter the Faculty of Education and become a teacher!</p>
<p><a href="http://etmooc.org">#etmooc</a> has been raising money all year but they are still short of the goal of $25,000 Canadian dollars. So, to boost efforts,Â <a href="http://etmooc.org">#etmooc</a> individuals have taken the incredible additional step of setting up an online auction to raise funds for the additional amount needed to fully fund the bursary.</p>
<p>So what am I asking you to do here? If you are interested in the auction items, please consider going to <a href="http://tiny.cc/mariocouros">http://tiny.cc/mariocouros</a> and scroll down the page to bid on various items that have been donated byÂ <a href="http://etmooc.org">#etmooc</a> participants. If youâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />re not interested in any of the items, you can also donate directly to the bursary through <b>Erin Werner </b>at the <b>University of Regina</b>, via phone at 306-585-5432, or via email at <a href="mailto:erin.werner@uregina.ca">erin.werner@uregina.ca</a></p>
<p>Or, if you are not in the place to bid or donate, please consider sharing this post. Iâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />m really hoping that we can fully fund the bursary.</p>
<p>Thank you so much for your support!<a href="http://educationaltechnology.ca/couros/2795/2686896755_72bdc2a8f7_o" rel="attachment wp-att-2796"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2796" src="http://educationaltechnology.ca/couros/wp-content/uploads/2017/01/2686896755_72bdc2a8f7_o.jpg" alt="" width="984" height="781" srcset="https://educationaltechnology.ca/wp-content/uploads/2017/01/2686896755_72bdc2a8f7_o.jpg 984w, https://educationaltechnology.ca/wp-content/uploads/2017/01/2686896755_72bdc2a8f7_o-300x238.jpg 300w, https://educationaltechnology.ca/wp-content/uploads/2017/01/2686896755_72bdc2a8f7_o-768x610.jpg 768w, https://educationaltechnology.ca/wp-content/uploads/2017/01/2686896755_72bdc2a8f7_o-378x300.jpg 378w" sizes="auto, (max-width: 984px) 100vw, 984px" /></a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://educationaltechnology.ca/2795/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Developing a Critical Disposition</title>
		<link>https://educationaltechnology.ca/2776/</link>
		
		<dc:creator><![CDATA[Alec]]></dc:creator>
		<pubDate>Sat, 14 Jan 2017 19:46:07 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[419]]></category>
		<category><![CDATA[catfishing]]></category>
		<category><![CDATA[diglit]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[infolit]]></category>
		<category><![CDATA[scammers]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">http://educationaltechnology.ca/couros/?p=2776</guid>

					<description><![CDATA[This morning, I received a photo (found below &#8211; I added the watermark) from a catfishing victim. She received it from a scammer who had used many of my personal and professional photos to form an online, intimate relationship with &#8230; <a href="https://educationaltechnology.ca/2776/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<div class="_5wd4 _1nc7 direction_ltr">
<div class="_h8t">
<div class="_5wd9">
<div class="_5wde _n4o">
<div class="_5w1r _3_om _5wdf">
<div class="_4gx_">
<div class="_d97">
<p><span style="font-weight: 400;">This morning, I received a photo (found below &#8211; I added the watermark) from a <a href="https://en.wikipedia.org/wiki/Romance_scam#Stolen_images">catfishing</a> victim. She received it from a scammer who had used many of my personal and professional photos to form an online, intimate relationship with her for the purpose of defrauding her out of money. The victim finally clued into the scam after already sending him thousands of dollars. While it may seem ridiculous to fall for such a scam, I receive hundreds of similar reports every year, and if you know of <a href="http://educationaltechnology.ca/couros/information-for-romance-scam-victims">my ongoing saga</a>, you will understand that I have tried my best to bring the problem to the attention of Facebook, Google, elected officials, law enforcement, etc. None of these organizations or agencies seem to be willing or able to do anything about this problem, and thus I feel the responsibility of teaching about such Internet scams must continue to be taken up by educators in K-12 and post-secondary institutions.</span></p>
<p><a href="http://educationaltechnology.ca/couros/2776/15965209_601818010942_3462871808509873316_n-2" rel="attachment wp-att-2787"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2787" src="http://educationaltechnology.ca/couros/wp-content/uploads/2017/01/15965209_601818010942_3462871808509873316_n-1.jpg" alt="" width="563" height="370" srcset="https://educationaltechnology.ca/wp-content/uploads/2017/01/15965209_601818010942_3462871808509873316_n-1.jpg 563w, https://educationaltechnology.ca/wp-content/uploads/2017/01/15965209_601818010942_3462871808509873316_n-1-300x197.jpg 300w, https://educationaltechnology.ca/wp-content/uploads/2017/01/15965209_601818010942_3462871808509873316_n-1-456x300.jpg 456w" sizes="auto, (max-width: 563px) 100vw, 563px" /></a></p>
<p><span style="font-weight: 400;">Over the years, I have seen teachers make great use of interesting &#8220;fake sites&#8221; designed to help studentsÂ develop information literacies/skills. Some of these include </span><a href="http://dhmo.org/"><span style="font-weight: 400;">DHMO.org</span></a><span style="font-weight: 400;">, </span><a href="http://zapatopi.net/treeoctopus/"><span style="font-weight: 400;">Save the Endangered Pacific Northwest Tree Octopus</span></a><span style="font-weight: 400;">, </span><a href="http://www.improbable.com/airchives/classical/cat/cat.html"><span style="font-weight: 400;">Feline reactions to bearded men</span></a><span style="font-weight: 400;">, and </span><a href="http://www.buydehydratedwater.com/"><span style="font-weight: 400;">DehydratedWater.com</span></a><span style="font-weight: 400;">. And while these are still great resources that can be used with some success, given the abundance of fake news and internet scams that inundate our digital society, there are plenty of opportunities to use fresh and authentic examples in class.</span></p>
<p><span style="font-weight: 400;">For instance, using the example of the photo above, students could employ some very basic info/digital literacy skills to identify the picture as a fake (i.e. photoshopped) picture through a reverse image search. <a href="https://www.youtube.com/watch?v=s6Q4U8DvJH8">In this Youtube video</a>, Iâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />ve previously demonstrated how to use Google Images to run a reverse image search</span><span style="font-weight: 400;">, but I also wanted to highlightÂ </span><a href="https://tineye.com/"><span style="font-weight: 400;">TinEye</span></a><span style="font-weight: 400;">Â as an alternativeÂ tool for this task. To try out TinEye for this purpose, I would suggest that you downloadÂ the above photo to your computer (ctrl-click+save or drag+drop), visit the </span><a href="https://tineye.com/"><span style="font-weight: 400;">TinEye site</span></a><span style="font-weight: 400;">, and then upload the image to TinEye (there is also a </span><a href="https://chrome.google.com/webstore/detail/tineye-reverse-image-sear/haebnnbpedcbhciplfhjjkbafijpncjl/related?hl=en"><span style="font-weight: 400;">TinEye Chrome extension</span></a><span style="font-weight: 400;">Â available that makes the process a little quicker).Â In the case of the photo above, using TinEye produces the following results:</span></p>
<p><a href="http://educationaltechnology.ca/couros/2776/18_results_-_tineye" rel="attachment wp-att-2781"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2781" src="http://educationaltechnology.ca/couros/wp-content/uploads/2017/01/18_results_-_TinEye.png" alt="" width="976" height="725" srcset="https://educationaltechnology.ca/wp-content/uploads/2017/01/18_results_-_TinEye.png 976w, https://educationaltechnology.ca/wp-content/uploads/2017/01/18_results_-_TinEye-300x223.png 300w, https://educationaltechnology.ca/wp-content/uploads/2017/01/18_results_-_TinEye-768x570.png 768w, https://educationaltechnology.ca/wp-content/uploads/2017/01/18_results_-_TinEye-404x300.png 404w" sizes="auto, (max-width: 976px) 100vw, 976px" /></a></p>
</div>
<div class="_d97">
<p><span style="font-weight: 400;">Exploring the resulting links, you will quickly discover that the original image shows <a href="http://www.cnn.com/2012/04/17/world/europe/norway-breivik-trial/">Anders Breivik, who killed 77 people in Norway in a terror attack in 2011</a></span><span style="font-weight: 400;">. Further investigation also reveals many additional photos of Breivik in custody,Â making it clear which version of the image is the photoshopped one (if the tiny size of my head compared to my body wasnâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t already enough proof).</span></p>
</div>
<p><a href="http://educationaltechnology.ca/couros/2776/output_mhqznw" rel="attachment wp-att-2782"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2782" src="http://educationaltechnology.ca/couros/wp-content/uploads/2017/01/output_mHQzNW.gif" alt="" width="563" height="370" /></a></p>
<div class="_d97">
<p><span style="font-weight: 400;">So there you have a component of a very basic information/digital literacy lesson that you could use in the classroom. However, I&#8217;d like to stress that these important tools and/or processes will likely not become first-nature to our students unless we help our students develop the disposition toÂ approach the world with a critical eye. Recent studies have shown that </span><a href="http://www.futurity.org/fake-news-literacy-young-people-1303892-2/"><span style="font-weight: 400;">young people are not, on the whole, very good at detecting fake news</span></a><span style="font-weight: 400;"> &#8211; and the </span><a href="http://www.cbsnews.com/news/fake-news-macedonia-teen-shows-how-its-done/"><span style="font-weight: 400;">stories that emerged regarding fake news about the U.S. presidential election being written by teens in Macedonia</span></a><span style="font-weight: 400;"> have made it clear that adults are equally vulnerable. There is little doubt that information/digital literacy will become more and more important in the years to come.</span></p>
<p><span style="font-weight: 400;">I&#8217;d love to hear from you. What strategies are you using in your classroom to help students become critical consumers and creators of information and media?Â </span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="_5wd4 _1nc7 direction_ltr"></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are you being catfished?</title>
		<link>https://educationaltechnology.ca/2758/</link>
		
		<dc:creator><![CDATA[Alec]]></dc:creator>
		<pubDate>Thu, 30 Jun 2016 23:07:54 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[21stcenturyskills]]></category>
		<category><![CDATA[419]]></category>
		<category><![CDATA[catfishing]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[infolit]]></category>
		<category><![CDATA[romancescams]]></category>
		<category><![CDATA[scammers]]></category>
		<guid isPermaLink="false">http://educationaltechnology.ca/couros/?p=2758</guid>

					<description><![CDATA[This post was written jointly with Katia Hildebrandt and also appears on her blog. Catfishing schemes, or romance scams, continue to plague social networking services. In fact, the issue has become so common that thereâ€™s a good chance that one &#8230; <a href="https://educationaltechnology.ca/2758/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>This post was written jointly with <a href="http://twitter.com/kbhildebrandt">Katia Hildebrandt</a> and also appears on <a href="http://katiahildebrandt.ca/are-you-being-catfished/">her blog</a>.</p>
<p><a href="https://en.wikipedia.org/wiki/Catfishing"><span style="font-weight: 400;">Catfishing schemes</span></a><span style="font-weight: 400;">, or romance scams, continue to plague social networking services. In fact, the issue has become so common that thereâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s a good chance that one of your recent â€œfriendâ€ requests actually came from a scammer versus someone who is actually interesting in pursuing a genuine friendship. Unfortunately, </span><a href="http://educationaltechnology.ca/couros/2627"><span style="font-weight: 400;">social networks on the whole seem content to turn a blind eye on the problem</span></a><span style="font-weight: 400;">, despite the fact that people lose thousands of dollars to these types of scams every day. So, due to this alarming issue and utter lack of response from social networking sites, weâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />ve compiled a few tips, techniques and questions to ask yourself when evaluating an online profile. We hope that this information might prove be useful for both personal use and as an instructional tool.</span></p>
<p><b>Step 1: Assess the authenticity of the profile picture</b></p>
<p><span style="font-weight: 400;">This is really the easiest place to start. Drop the picture into </span><a href="https://www.youtube.com/watch?v=s6Q4U8DvJH8"><span style="font-weight: 400;">Googleâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s reverse image search</span></a><span style="font-weight: 400;"> to see where else the image appears. </span><a href="https://www.tineye.com/"><span style="font-weight: 400;">TinEye</span></a><span style="font-weight: 400;">, a dedicated reverse-image search engine, is also a great tool that can be used for to perform this search. If the picture is associated with many different names or profiles, itâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s likely that youâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />re dealing with a scam account.</span></p>
<p><b>Step 2: Critique the bio</b></p>
<p><span style="font-weight: 400;">Catfishing accounts often use similar biographical components. Some red flags include:</span></p>
<ul>
<li><span style="font-weight: 400;">A relationship status of â€œwidowedâ€ or â€œdivorcedâ€ (obviously not all widowed or divorced people are catfishers, but this status in combination with other red flags might be an indication of a fake account)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">A job that is of exceptional status and that may require a great deal of travel and/or periods without communication (e.g., military, engineer, oil worker, self-employed, shipping), making it easy for the scammer to make excuses for being absent, unavailable, or out of the country.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An â€œaboutâ€ section that includes clichÃ©d, romantic statements such as â€œlooking for loveâ€ or statements that may stereotypically reinforce oneâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s integrity (as in this scammer profile below; also note that he describes himself as â€œGod-fearingâ€ and that there are obvious spelling mistakes in the name of the supposed alma mater &#8211; which we discuss more later):</span></li>
</ul>
<p><span style="font-weight: 400;"><a href="http://katiahildebrandt.ca/wp-content/uploads/2016/06/1.png"><img loading="lazy" decoding="async" class="size-medium wp-image-293 aligncenter" src="http://katiahildebrandt.ca/wp-content/uploads/2016/06/1-300x244.png" alt="1" width="300" height="244" /></a></span></p>
<p><b>Step 3: Investigate the profile name</b></p>
<p><span style="font-weight: 400;">The name on the account can also be a clue about the legitimacy of the account:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Many catfishers seem to pull from a list of popular names. If you search for the profile name on Facebook and lots of other profiles with the same name and similar occupations pop up, you may want to look more closely. At the time of writing, numerous â€œNelson Colbertâ€ profiles appear on Facebook and all seem to be fake profiles made up similar components discussed so far (e.g., stolen profile photo, suspect occupation, etc.).</span></li>
</ul>
<p><a href="http://katiahildebrandt.ca/wp-content/uploads/2016/06/2.png"><img loading="lazy" decoding="async" class="wp-image-292 aligncenter" src="http://katiahildebrandt.ca/wp-content/uploads/2016/06/2-300x211.png" alt="2" width="250" height="179" /></a></p>
<ul>
<li style="font-weight: 400;">Check to make sure that the name on the profile matches the name in the URL. Otherwise, it might be a sign that the scammer has had to change their profile name when a victim found them out.</li>
</ul>
<p><span style="font-weight: 400;"><a href="http://katiahildebrandt.ca/wp-content/uploads/2016/06/3.png"><img loading="lazy" decoding="async" class="size-medium wp-image-286 aligncenter" src="http://katiahildebrandt.ca/wp-content/uploads/2016/06/3-300x169.png" alt="3" width="300" height="169" /></a>Google the profile name. Most people have at least some sort of digital footprint these days. Can you find the person? Does what you find match up with what they are telling you?</span></p>
<p><b>Step 4: Investigate the profile page<br />
</b><br />
<span style="font-weight: 400;">Some other elements of the profile to watch out for include:</span></p>
<ul>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Number of friends:</span></i><span style="font-weight: 400;"> Does the person have few friends? Do their friends interact authentically with them on their page, or do you only see the same people commenting/liking over and over again?</span></li>
<li style="font-weight: 400;"><i></i><i><span style="font-weight: 400;">Types of friends: </span></i><span style="font-weight: 400;">Often, if you are able to see the scammerâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s friend list, it will consist overwhelmingly of people of the opposite gender (the target victims), as in this screenshot of a male scammerâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s friend list:</span></li>
</ul>
<p><a href="http://katiahildebrandt.ca/wp-content/uploads/2016/06/4.png"><img loading="lazy" decoding="async" class="size-medium wp-image-291 aligncenter" src="http://katiahildebrandt.ca/wp-content/uploads/2016/06/4-300x287.png" alt="4" width="300" height="287" /></a></p>
<ul>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Age of the profile:</span></i><span style="font-weight: 400;"> Is the profile brand new, or is there a history of photo uploads, status updates, posts from others, etc? Also, note that profile posts can be backdated and locations can be faked (as seen in the image below) to make a profile seem like it has a longer history than it actually does. However, the year that the (Facebook) profile was created canâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t be faked.</span></li>
</ul>
<p><a href="http://katiahildebrandt.ca/wp-content/uploads/2016/06/5.png"><img loading="lazy" decoding="async" class="size-medium wp-image-290 aligncenter" src="http://katiahildebrandt.ca/wp-content/uploads/2016/06/5-300x213.png" alt="5" width="300" height="213" /></a></p>
<ul>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Photos: </span></i><span style="font-weight: 400;">Does the profile have only a few photos, or are there a variety of photos, including photos with others (watch out for pictures with children, as this can be part of the scam)? Do the photos look photoshopped (see â€œghost dogâ€ example below)?<br />
</span><span style="font-weight: 400;"><a href="http://katiahildebrandt.ca/wp-content/uploads/2016/06/6.jpg"><br />
<img loading="lazy" decoding="async" class="size-medium wp-image-285 aligncenter" src="http://katiahildebrandt.ca/wp-content/uploads/2016/06/6-261x300.jpg" alt="6" width="261" height="300" /></a></span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Mutual friends: </span></i><span style="font-weight: 400;">Do you have any mutual friends? Note that having a small number of mutual friends isnâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t necessarily a sign of legitimacy: scammers will sometimes friend a victimâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s friends to make themselves seem more legit. If you have only a small number of mutual friends, itâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s a good idea to contact those friends to see if they actually know the person. In many cases, your friend may have accepted the fake profile, due to less discerning personal protocols regarding â€œfriendingâ€ or simply in error.</span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Language/grammar:</span></i><span style="font-weight: 400;"> Many scammers do not speak English as a first language. If you notice many spelling or grammar mistakes even though the person claims to be from an English-speaking country, proceed with caution. </span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Religious affiliation:</span></i><span style="font-weight: 400;"> Scammers will also often pose as devoutly religious individuals and sometimes use scripture or religious language to appear more trustworthy or to manipulate their victims through shared belief-systems. In fact, religion-specific dating sites such as </span><a href="https://www.christianmingle.com/"><span style="font-weight: 400;">Christian Mingle</span></a><span style="font-weight: 400;">, </span><a href="https://www.jdate.com/"><span style="font-weight: 400;">JDate</span></a><span style="font-weight: 400;">, or </span><a href="http://www.shaadi.com/"><span style="font-weight: 400;">Shaadi</span></a><span style="font-weight: 400;"> are often used by scammers.</span></li>
</ul>
<p><b>Step 5: Watch for tell-tale behaviours</b></p>
<p><span style="font-weight: 400;">Scammers often follow predictable patterns of behaviour, and there are some common red flags:</span></p>
<ul>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Use of a private messaging platform:</span></i><span style="font-weight: 400;"> A scammer will often quickly try to move the interactions over to email, SMS, or a different instant messaging platform. This is done so that if the original profile is identified as a fake account and removed by the social network, the scammer will not lose direct contact with their potential victim.</span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Rushing towards commitment: </span></i><span style="font-weight: 400;">Scammers will try to move online relationships forward very quickly. Itâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s not uncommon for a catfisher to bring up marriage or to profess their love after only a few days or interactions; this helps to build a great sense of attachment and obligation, making victims more likely to agree to help the scammer later on.</span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Refusal to use video communication: </span></i><span style="font-weight: 400;">Catfishers will often refuse to use anything but text or voice-based communication and will give excuses about poor connections to avoid having to Skype. </span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Out-of-sync, glitchy, or looped video: </span></i><span style="font-weight: 400;">If a scammer does agree to video chat, their stream will generally be of very poor quality. This is because </span><a href="https://www.youtube.com/watch?v=-QdzG8l_OlQ"><span style="font-weight: 400;">the scammer is usually using stolen footage that they found on Youtube or elsewhere online in order to fake a live conversation</span></a><span style="font-weight: 400;">. In such cases, if audio is also present, it will appear to be out of sync with the video. Scammers may also cut video conversations short and complain of connectivity issues.</span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Repeated excuses to avoid meeting face to face:</span></i><span style="font-weight: 400;"> Catfishers will often make plans to meet up with their victims, but these plans will always fall through at the last minute for one reason or another.</span></li>
<li style="font-weight: 400;"><i></i><i><span style="font-weight: 400;">Requests for compromising photos/videos:</span></i><span style="font-weight: 400;"> Often, scammers will request nude images or ask victims to participate in video chats of a sexual nature. These images or videos can then later be used to blackmail the victim, for instance, by threatening to send the files to the victimâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s entire contact list or employer.</span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Emergencies:</span></i><span style="font-weight: 400;"> Once the catfisher has hooked their victim, they will likely be involved in some type of â€œemergencyâ€ situation. This might be an illness, loss of job, or the need to leave a location suddenly. In many cases, the scammerâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s â€œchildrenâ€ may be involved.</span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Requests for money: </span></i><span style="font-weight: 400;">This is obviously the top indication that you are dealing with a scammer. The request can take a variety of forms; two common techniques include </span><a href="https://en.wikipedia.org/wiki/Advance-fee_scam"><span style="font-weight: 400;">advanced-fee fraud</span></a><span style="font-weight: 400;"> and requests for a money transfer through a company like </span><a href="http://global.moneygram.com/"><span style="font-weight: 400;">Moneygram</span></a><span style="font-weight: 400;"> or </span><a href="http://www.westernunion.ca/WUCOMWEB/staticMid.do?method=load&amp;countryCode=CA&amp;languageCode=en&amp;pagename=HomePage"><span style="font-weight: 400;">Western Union</span></a><span style="font-weight: 400;"> (to make the money difficult to trace). Often, the victim will be told to send the money to someone other than the scammer (since the scammer is using a fake name).</span></li>
</ul>
<p><b>Step 6: Ask for confirmation of identification </b></p>
<p><span style="font-weight: 400;">If you still arenâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t completely sure whether or not you are dealing with a scammer, you can always ask for some form of confirmation. </span></p>
<ul>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Passport: </span></i><span style="font-weight: 400;">Often scammers will provide a photoshopped passport as proof of identity (as in the image below). If the passport seems questionable, you can find images of real passports from various countries and compare them. You can also check out the passport photo guidelines for various countries (for instance, </span><a href="https://travel.state.gov/content/passports/en/passports/photos/photos.html"><span style="font-weight: 400;">here are the US guidelines</span></a><span style="font-weight: 400;"><span style="font-weight: 400;">), which can help you determine if the photo meets the size/shape requirements.</span></span></li>
</ul>
<p><a href="http://katiahildebrandt.ca/wp-content/uploads/2016/06/7.png"><img loading="lazy" decoding="async" class="size-medium wp-image-289 aligncenter" src="http://katiahildebrandt.ca/wp-content/uploads/2016/06/7-300x211.png" alt="7" width="300" height="211" /></a></p>
<ul>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Real-time photo or video:</span></i><span style="font-weight: 400;"><span style="font-weight: 400;"> To verify identity, you can ask the individual to provide a real-time photo (with a newspaper with that dayâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s date, or holding up a certain number of fingers) or to perform certain actions while on video (raise one hand, clap hands, etc.). As well, if the scammer does provide a photo, be sure to check for signs of photoshopping, like in this picture below where the head has been (poorly) photoshopped onto the body and thus seems inordinately large.</span></span></li>
</ul>
<p><a href="http://katiahildebrandt.ca/wp-content/uploads/2016/06/8.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-287 aligncenter" src="http://katiahildebrandt.ca/wp-content/uploads/2016/06/8-240x300.jpg" alt="8" width="240" height="300" /></a></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">At this point, we also canâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t stress enough the need to use your common sense. If a profile just seems too good to be true, it unfortunately probably is (just like you donâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t </span><i><span style="font-weight: 400;">really</span></i><span style="font-weight: 400;"> have a secret relative who is the king of an African country and wants to share his wealth with you).</span></li>
</ul>
<p><b>Step 7: Block, report, and warn others</b></p>
<p><span style="font-weight: 400;">Once you have determined that you are communicating with a scammer profile, there are a few steps you should take:</span></p>
<ul>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Report:</span></i><span style="font-weight: 400;"> Most social networking or dating sites have some sort of reporting tool. Often, reporting a profile will lead to it being taken down, preventing future scams on that account. As well, many victims report fake profiles to sites like </span><a href="http://www.romancescam.com/forum/index.php"><span style="font-weight: 400;">Romance Scam</span></a><span style="font-weight: 400;"> or to </span><a href="https://docs.google.com/forms/d/1MNPEEeVX9vuMUHOLBxBVT-uKi4KYtmPeKkQxQUZGC3I/viewform?usp=send_form"><span style="font-weight: 400;">Facebook groups set up to share information on scammers</span></a><span style="font-weight: 400;">.</span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Block: </span></i><span style="font-weight: 400;">Once you have reported the profile, you should unfriend and block the user. You may believe that the damage is already done, but if you do not unfriend and block the scammer, they will still have access to your photos, account info, and friends list. As well, people may see that you are friends with the scammer and take this as a sign that they can safely friend the account themselves.</span></li>
<li style="font-weight: 400;"><i><span style="font-weight: 400;">Warn others:</span></i><span style="font-weight: 400;"> Another good step is to warn others in your circle of friends, especially if you notice that the scammer is attempting to connect with other members of your contact list.</span></li>
<li style="font-weight: 400;"><i></i><i><span style="font-weight: 400;">Be vocal: </span></i><span style="font-weight: 400;">Although there have been many attempts to improve policies at social networking services (weâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />re looking at you, Facebook), ultimately it will likely take a critical mass of </span><a href="http://cogdogblog.com/2016/02/dear-facebook/"><span style="font-weight: 400;">complaints</span></a><span style="font-weight: 400;">, </span><a href="http://www.cbc.ca/news/canada/saskatchewan/regina-man-s-identity-used-in-online-romance-scamming-1.2800046"><span style="font-weight: 400;">media coverage</span></a><span style="font-weight: 400;">, and awareness in order to achieve real change. So make you voice heard!</span></li>
</ul>
<p><b>Other things to look out for:</b></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Scammer â€œfamiliesâ€: In some cases, scammers will create an elaborate network of friends and family in order to bring legitimacy to the scammer profile. For instance, the fake Alex Gallartâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s circle of contacts included his mother, friend, and daughter (of these, only the motherâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s profile, </span><a href="https://travel.state.gov/content/passports/en/passports/photos/photos.html"><span style="font-weight: 400;">Maria Gallart</span></a><span style="font-weight: 400;">, is still up). In this case, scammers were actually using real photos of Alecâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s family members to build the fake family.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Twinned accounts: One technique weâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />ve seen more of recently is when scammers create accounts that are essentially doubles of existing accounts. For instance, see these two photos:</span></li>
</ul>
<p><img loading="lazy" decoding="async" class=" wp-image-288 aligncenter" src="http://katiahildebrandt.ca/wp-content/uploads/2016/06/9-300x123.png" alt="9" width="340" height="147" /></p>
<p><span style="font-weight: 400;">Scammers will use these profiles to connect with the real personâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s friends and family, who simply think they are (re)connecting with the victim. Then, the scammer can use a variation on the â€œ</span><a href="http://www.antifraudcentre-centreantifraude.ca/fraud-escroquerie/types/emergency-urgence/index-eng.htm"><span style="font-weight: 400;">grandparent scam</span></a><span style="font-weight: 400;">â€in order to ask friends and family to send money to deal with an emergency.</span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Facebook Is Still Broken &#8230;</title>
		<link>https://educationaltechnology.ca/2740/</link>
					<comments>https://educationaltechnology.ca/2740/#comments</comments>
		
		<dc:creator><![CDATA[Alec]]></dc:creator>
		<pubDate>Sat, 16 Apr 2016 20:39:48 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[catfish]]></category>
		<category><![CDATA[catfishing]]></category>
		<category><![CDATA[digcit]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[scammers]]></category>
		<guid isPermaLink="false">http://educationaltechnology.ca/couros/?p=2740</guid>

					<description><![CDATA[I received this email a few minutes ago (and a few hours after I noticed that my Facebook account was down). For the fourth time, Facebook has disabled my account because the company doesn&#8217;t believe I am who I say &#8230; <a href="https://educationaltechnology.ca/2740/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>I received this email a few minutes ago (and a few hours after I noticed that <a href="http://facebook.com/courosa">my Facebook account</a> was down).</p>
<p><a href="http://educationaltechnology.ca/couros/2740/katia_hildebrandt_says___" rel="attachment wp-att-2741"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2741" src="http://educationaltechnology.ca/couros/wp-content/uploads/2016/04/Katia_Hildebrandt_says___.png" alt="Katia_Hildebrandt_says___" width="666" height="403" srcset="https://educationaltechnology.ca/wp-content/uploads/2016/04/Katia_Hildebrandt_says___.png 666w, https://educationaltechnology.ca/wp-content/uploads/2016/04/Katia_Hildebrandt_says___-300x182.png 300w, https://educationaltechnology.ca/wp-content/uploads/2016/04/Katia_Hildebrandt_says___-496x300.png 496w" sizes="auto, (max-width: 666px) 100vw, 666px" /></a></p>
<p>For the fourth time, Facebook has disabled my account because the company doesn&#8217;t believe I am who I say I am.</p>
<p>Yes, apparently <em>I&#8217;m</em> the one with the fake account.</p>
<p>Not &#8220;<a href="https://www.facebook.com/obriengary.neil.3">Obrien Gary Neil</a>&#8221; or &#8220;<a href="https://www.facebook.com/profile.php?id=100011691610422&amp;fref=ts">Michael Walter</a>&#8221; or &#8220;<a href="https://www.facebook.com/nelson.colbert.9?fref=ts">Nelson Colbert</a>&#8221; or &#8220;<a href="https://www.facebook.com/trofimov.sergei.946?fref=ts">Trofimov Sergei</a>&#8221; or &#8220;<a href="https://www.facebook.com/anne.landman.73">Anne Landman</a>&#8221; or &#8220;<a href="https://www.facebook.com/dounas.mounir.1">Dounas Mounir</a>&#8221; or &#8220;<a href="https://www.facebook.com/profile.php?id=100011623352892">Kyle W. Norman</a>&#8221; or one of the hundreds of other fake accounts that I have reported to Facebook for using my images to <a href="http://couros.ca/x/catfish">scam vulnerable women across the globe</a>.Â No. Once again,Â Facebook has decided to disable <em>my</em> account for using a fake name.</p>
<p><em>Despite the fact thatÂ I&#8217;ve already had to submit my government-issued ID to Facebook in each previous case. </em></p>
<p><em>Despite the fact that my account is nearly a decade old and linked to 2000+ Facebook friends. </em></p>
<p><em>Despite the fact that I&#8217;ve had countless media interviews about the problem.</em></p>
<div class="text_exposed_show">
<p>If it can happen to me, it could certainly happen to you.</p>
<p>I&#8217;m starting to feel like a broken record, but I really need your help. Please share so that we canÂ get Facebook&#8217;s attention. The reporting system is badly flawed, and as I&#8217;ve written previously, <a href="http://educationaltechnology.ca/couros/2482">Facebook really needs to get it fixed</a>.</p>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://educationaltechnology.ca/2740/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Facebook Is About To Make Catfishing Problems Even Worse</title>
		<link>https://educationaltechnology.ca/2725/</link>
					<comments>https://educationaltechnology.ca/2725/#comments</comments>
		
		<dc:creator><![CDATA[Alec]]></dc:creator>
		<pubDate>Fri, 25 Mar 2016 21:31:21 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[419]]></category>
		<category><![CDATA[catfishing]]></category>
		<category><![CDATA[citizenship]]></category>
		<category><![CDATA[digcit]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">http://educationaltechnology.ca/couros/?p=2725</guid>

					<description><![CDATA[Over the past week, I&#8217;ve hadÂ a number of people share articles with me related to Facebook&#8217;s testing of a new feature that is purported toÂ alert Facebook users when it finds that someoneÂ is impersonating your account. Once the user is alerted, &#8230; <a href="https://educationaltechnology.ca/2725/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p><a href="http://educationaltechnology.ca/couros/2725/scam-computer-keys-showing-swindles-and-fraud" rel="attachment wp-att-2736"><img loading="lazy" decoding="async" class="size-large wp-image-2736 aligncenter" src="http://educationaltechnology.ca/couros/wp-content/uploads/2016/03/Internet-Scams-1024x768.jpg" alt="Scam Computer Keys Showing Swindles And Fraud" width="584" height="438" srcset="https://educationaltechnology.ca/wp-content/uploads/2016/03/Internet-Scams-1024x768.jpg 1024w, https://educationaltechnology.ca/wp-content/uploads/2016/03/Internet-Scams-300x225.jpg 300w, https://educationaltechnology.ca/wp-content/uploads/2016/03/Internet-Scams-768x576.jpg 768w, https://educationaltechnology.ca/wp-content/uploads/2016/03/Internet-Scams-400x300.jpg 400w" sizes="auto, (max-width: 584px) 100vw, 584px" /></a></p>
<p>Over the past week, I&#8217;ve hadÂ a number of people share articles with me related to Facebook&#8217;s testing of <a href="http://mashable.com/2016/03/22/facebook-impersonation-alert/#fLwdlR61Igqw">a new feature that is purported toÂ alert Facebook users when it finds that someoneÂ is impersonating your account</a>. Once the user is alerted, that user is then able to report the fraudulent account and pray that Facebook will take it down. However, given my <a href="http://couros.ca/x/catfish">8 years of experience with this problem</a>, I feel that I am qualified to sayÂ that this approach will simply not work for a number of reasons.</p>
<ol>
<li><strong>Facebook often fails toÂ take down fraudulent profiles:</strong>Â While I have successfully had Facebook take down hundreds of fake profiles (I find several new ones each day), there are certain profiles that it simply does not take down. For instance, I&#8217;ve been trying to get Facebook to take down the account of &#8220;<a href="https://www.facebook.com/trofimov.sergei.946">Trofimov Sergei</a>&#8221; (a user who is clearly using a profile photo of me and my son) for over a year now. Yet, no matter how many times I report the account, the profile remains. More disturbing is the fact that if you search for &#8220;Trofimov Sergei&#8221; on Facebook, you will see dozens of fake accounts by the same name using stolen photos of other men. Most of the deception is done in private communication with the (potential) victims, but every once in a while, you will findÂ <a href="https://www.facebook.com/groups/thaimakemoneyhome/permalink/999965480093943/">a public post where the fraudsters are asking for money for a feigned illness</a>. Luckily, <a href="https://www.facebook.com/526547287378829/photos/a.532006330166258.127771.526547287378829/1035851769781709/?type=1&amp;theater">there are many people (often former victims) who do uncover and share their knowledge of these fraudulent accounts</a> in order to contain some of the damage.</li>
<li><strong>Scammers may use photos of your children as their profile photo:</strong>Â After hundreds of reports, Facebook still refuses to take down the accountÂ of &#8220;<a href="https://www.facebook.com/nelson.colbert.9">Nelson Colbert</a>,&#8221; a scammerÂ who is using photos of my children as a profile photo. When you report an impersonation in Facebook&#8217;s current reporting tool, youÂ ultimately have to choose one of the following: A) &#8220;This timeline is pretending to be me or someone that I know&#8221;, or B) &#8220;This timeline is using a fake name.&#8221; I have been completely unsuccessful when using Option B, and I have had only limited success with Option A: when you choose this option, you are asked to identify the user who is being impersonated, but when I identify myself,Â Facebook quickly rejects the report as it is clear that I am not the person in the profile photo. I have attempted to use Facebook&#8217;s &#8220;<a href="https://www.facebook.com/help/contact/209046679279097">Report An Underage Child</a>&#8221; tool (which is only available in Canada after you logout, apparently), but this has also been completely unsuccessful. The most unnerving part of this particular profileÂ is that I receive more reports about it from victims than I do aboutÂ any other. In fact, there are literally dozens of pages of search results that relate to &#8220;Nelson Colbert&#8221; and this scammer&#8217;s involvement in fraudulent activities.Â Yet, it appears that Facebook has made this account untouchable. I suspect that the scammer behind it <a href="https://www.facebook.com/courosa/posts/574303769702">may have created falsified documentation</a>Â to get the account validated internally.</li>
<li><strong>Scammers may use your elderly mother&#8217;s photo as their profile picture:</strong>Â These <a href="http://educationaltechnology.ca/couros/2627">criminals often create sophisticated networks of friends and family in their schemes</a>. For instance,Â the scammers created a fake profile using my mother&#8217;s photos and named her <a href="https://www.facebook.com/profile.php?id=100005760019306&amp;fref=ts">Maria Gallart</a>. I cannot report this profile directly to Facebook; instead I am only able to report it to my mother to deal with it.Â I did so, and as you would imagine, the distress, anxiety, and uncertainty that this caused my nearlyÂ 80-year-old motherÂ was not something that she needed nor something that she necessarily knew how to deal with. And even with my assistance, reporting the fraudulent account from my mother&#8217;s account (many times) has not led to the account being taken down.</li>
<li><strong>Facebook doesn&#8217;t always believe the &#8220;real&#8221; person in cases of identity fraud:</strong>Â <a href="http://educationaltechnology.ca/couros/2482">Facebook has taken down my account twice</a> because a scammer reported me as being the fake Alec Couros. In both cases, I had to submit my passport to Facebook via email for verification (which is incredibly problematic for security reasons). I am unsure of why I had to do this twice, and I am puzzled as to why my account wasn&#8217;t <a href="https://www.facebook.com/help/196050490547892">verified</a> either time (even though I have applied for verified status). Facebook&#8217;sÂ proposed system will have to rely on verifying an account using a secure, consistent, and foolproof system if it is to be successful.Â To date, the company has failed miserably in this respect.</li>
<li><strong>Facebook&#8217;s proposed system could give an advantage to the criminals:</strong>Â Fraudsters have often used photos of me that I have never previously used on Facebook. Based on the incomplete details provided so far about this new alert system, one might assume that if I were to use any of my personal photos after a scammer had done so, I would be the one flagged as an impersonator. Thus, theÂ criminal might easily beÂ regarded as having the authentic profile, which sounds like really bad news.</li>
</ol>
<p>The Mashable article shared at the beginning of this post states that Facebook is rolling out these features as the company attempts to push its presenceÂ into regions of the world where &#8220;[impersonation] may have certain cultural or social ramifications&#8221; andÂ &#8220;as part of ongoing efforts to make women around the world feel more safe using Facebook.&#8221;Â If that is the goal, Facebook&#8217;s proposed technology won&#8217;t help, and it may very well make things worse for women (or anyone) using the site. Already, Facebook is plagued with identity thievesÂ who adversely affect the safety, comfort, and freedom of many of its users, and the problem will only continue to grow with these types of half-baked efforts. You may not be affected now, but unless Facebook does something to fully address this issue, you almost certainly will be.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://educationaltechnology.ca/2725/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>The Future of Identity Theft</title>
		<link>https://educationaltechnology.ca/2719/</link>
		
		<dc:creator><![CDATA[Alec]]></dc:creator>
		<pubDate>Sat, 19 Mar 2016 19:40:10 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[419]]></category>
		<category><![CDATA[catfishing]]></category>
		<category><![CDATA[face swap]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[scammers]]></category>
		<category><![CDATA[scams]]></category>
		<guid isPermaLink="false">http://educationaltechnology.ca/couros/?p=2719</guid>

					<description><![CDATA[I&#8217;ve written and spoken extensively about my problems with romance scammers, criminals who have used my photos (and the photos of many others) to create fake profiles and trick victims into sending them significant amounts of money. In my research, &#8230; <a href="https://educationaltechnology.ca/2719/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ve written and spoken extensively about<a href="http://educationaltechnology.ca/couros/information-for-romance-scam-victims"> my problems with romance scammers</a>, criminals who have used my photos (and the photos of many others) to create fake profiles and trick victims into sending them significant amounts of money. In my research, I&#8217;ve learned that many potential victims ask for a video chat with scammers as a way for them to prove their identities. In fact, participating in a video chat and then asking supposed suitors to perform particular actions on request (e.g., hold up two fingers on your left hand) is often touted on anti-scammer sites as a way to ensure that the person that you are talking to is in fact who they say they are and not a scammer who may beÂ <a href="https://www.youtube.com/watch?v=-QdzG8l_OlQ">using recorded video as their video source</a>Â (a common and frightening possibility).</p>
<p>Well, verifying identity online has just become even more complex. As you have already likely discovered, there are a number of freely available apps (e.g., <a href="http://www.pcadvisor.co.uk/how-to/social-networks/how-face-swap-in-snapchat-other-apps-3636570/">Snapchat</a>,Â <a href="http://faceswaplive.com">FaceSwap Live</a>, <a href="https://itunes.apple.com/us/app/msqrd-live-filters-face-swap/id1065249424?mt=8">MSQRD</a>) that allow for live <a href="http://what is the best face swapping software">face-swapping</a>. In fact, <a href="http://www.theverge.com/2016/3/9/11186094/facebook-masquerade-face-swapping-app-acquisition">MSQRD was recently purchased by Facebook</a>, and there have been suggestions that <a href="http://www.techinsider.io/facebook-buys-popular-msqrd-face-swapping-app-2016-3">face-swapping could become more directly integrated into the social network</a>.Â If you have used one of these apps, you&#8217;ll likely agree that face-swapping can be a lot of fun, but these are fairly touchy/glitchy apps and their use could be easily detected. However, this may not be the case for long.</p>
<p><a href="http://www.graphics.stanford.edu/~niessner/thies2016face.html">Researchers from Stanford University recently released a project</a> that works to &#8220;animate the facial expressions of the target video by a source actor and re-renders the manipulated output video in a photo-realistic fashion.&#8221; <a href="https://www.youtube.com/watch?v=ohmajJTcpNk">The results are incredible</a>, but the implications for identity theft are incredibly frightening, in effect allowing scammers to become puppet masters who manipulate the faces and bodies of their fake profile avatars. Takes the idea of &#8220;authentic identity&#8221; to a whole new level, doesn&#8217;t it?</p>
<p><iframe loading="lazy" title="Face2Face: Real-time Face Capture and Reenactment of RGB Videos (CVPR 2016 Oral)" width="584" height="438" src="https://www.youtube.com/embed/ohmajJTcpNk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>r/NextSpace (Reddit)</title>
		<link>https://educationaltechnology.ca/2714/</link>
		
		<dc:creator><![CDATA[Alec]]></dc:creator>
		<pubDate>Sat, 12 Mar 2016 18:25:05 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[ama]]></category>
		<category><![CDATA[community]]></category>
		<category><![CDATA[conversation]]></category>
		<category><![CDATA[digcit]]></category>
		<category><![CDATA[edtech]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[reddit]]></category>
		<guid isPermaLink="false">http://educationaltechnology.ca/couros/?p=2714</guid>

					<description><![CDATA[For a number of years, I&#8217;ve enjoyed using Reddit as a source for my daily reading. Reddit, often known as &#8220;the front page of the Internet,&#8221; is often where one can find stories and trends before they go viral in &#8230; <a href="https://educationaltechnology.ca/2714/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>For a number of years, I&#8217;ve enjoyed using <a href="http://www.reddit.com">Reddit</a> as a source for my daily reading. Reddit, often known as &#8220;the front page of the Internet,&#8221; is often where one can find stories and trends before they go viral in the mainstream.Â As well, because of the networking and conversational properties of the spaces, I&#8217;ve often mused about the potential of Reddit as a space where educational conversations might be hosted and shared. There are several education-related subreddits (specifically-themed topics or communities) such as <a href="https://www.reddit.com/r/education">r/education</a> and <a href="https://www.reddit.com/r/edtech">r/edtech</a>, but these spaces tend to be a bit stagnant.</p>
<p>Just recently, my friend <a href="https://twitter.com/j0hnburns">@j0hnburns</a> (and colleagues) took on the idea of developing a new subreddit at r/NextSpace with the goal of creating a space where deeper conversations around edtech related topics could be hosted and shared. <a href="http://www.j0hn.org/blog/twitter-is-great-but-we-re-ready-for-more">He&#8217;s written about the launch</a> and has included the overall rationale, how to get to started with Reddit, andÂ how to contribute to <a href="https://www.reddit.com/r/nextspace">r/NextSpace</a>.</p>
<p>To help with this launch, I&#8217;ve agreed to do an AMA (Ask Me Anything) starting on Monday March 14th, 8pm EST (or see your time conversion <a href="http://bit.ly/CourosAMA">here</a>). To participate, check out <a href="https://www.reddit.com/r/NextSpace/comments/4a2nw7/im_dr_alec_couros_professor_of_edtech_media/">this AMA thread</a>, ask questions (you can post them early if you like), upvote or downvote the questions or comments of others, and I will do my best to respond to whatever gets asked. I knowÂ I&#8217;m nowhere near as big of a draw as thoseÂ who have led some of the <a href="https://www.reddit.com/r/IAmA/search?q=ama&amp;sort=top&amp;restrict_sr=on">most popular AMAs</a>, but hey, I&#8217;d like to help in any way to get this started. Plus, I think I have a lot to share regarding my thoughts on edtech, digital citizenship, digital identity, or other related topics. And of course, an AMA is about what you contribute as well!</p>
<p>So I hope that you will give Reddit and r/NextSpace a try, and hopefully I&#8217;ll hear from you at the AMA next week!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Catfishing Tricks Become More Complex</title>
		<link>https://educationaltechnology.ca/2706/</link>
		
		<dc:creator><![CDATA[Alec]]></dc:creator>
		<pubDate>Wed, 09 Mar 2016 23:36:11 +0000</pubDate>
				<category><![CDATA[All]]></category>
		<category><![CDATA[419]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[literacy]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[theft]]></category>
		<guid isPermaLink="false">http://educationaltechnology.ca/couros/?p=2706</guid>

					<description><![CDATA[Yesterday, I receivedÂ the following Facebook message: I posted this to my Facebook wall when I received it, and it was interesting to hear from several people who felt they might have been fooled had they received the same message. After &#8230; <a href="https://educationaltechnology.ca/2706/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Yesterday, I receivedÂ the following Facebook message:</p>
<p><a href="http://educationaltechnology.ca/couros/2706/screen-shot-2016-03-08-at-5-11-43-pm" rel="attachment wp-att-2707"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2707" src="http://educationaltechnology.ca/couros/wp-content/uploads/2016/03/Screen-Shot-2016-03-08-at-5.11.43-PM.png" alt="Message from &quot;Bola Shagaya&quot;" width="372" height="565" srcset="https://educationaltechnology.ca/wp-content/uploads/2016/03/Screen-Shot-2016-03-08-at-5.11.43-PM.png 372w, https://educationaltechnology.ca/wp-content/uploads/2016/03/Screen-Shot-2016-03-08-at-5.11.43-PM-198x300.png 198w" sizes="auto, (max-width: 372px) 100vw, 372px" /></a></p>
<p>I posted this to my Facebook wall when I received it, and it was interesting to hear from several people who felt they might have been fooled had they received the same message. After nearly a decade of becoming familiar with the tricks of these scammers, I question just about every angle. While this was the first time that I have received a message like this, the motive for the message seemed obvious to me. A photo of me that verifies the date would make it possible for a scammer to &#8220;prove&#8221; they were really me (rather than just using old photos). As well, if I hadÂ Googled the name of the sender (like my colleague Katia did), I might have wondered how <a href="https://en.wikipedia.org/wiki/Bola_Shagaya">this famous Nigerian business woman</a> had the time to message me personally (and perhaps even why she cared about a mere 150K).</p>
<p>Today, I was contacted by another person on Facebook who had heard from her friends that a profile with her name, photos, and identifying information was trying to friendÂ many of them. Several reported this to be suspicious so she immediately warned her friends with a status update. I asked her where the fake profile was and she found it for me. What we noticed was really sneaky (and horrible).</p>
<p>See below, the real person&#8217;s profile:</p>
<p><a href="http://educationaltechnology.ca/couros/2706/joy_brennan" rel="attachment wp-att-2708"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2708" src="http://educationaltechnology.ca/couros/wp-content/uploads/2016/03/Joy_Brennan.png" alt="Joy_Brennan" width="998" height="731" srcset="https://educationaltechnology.ca/wp-content/uploads/2016/03/Joy_Brennan.png 998w, https://educationaltechnology.ca/wp-content/uploads/2016/03/Joy_Brennan-300x220.png 300w, https://educationaltechnology.ca/wp-content/uploads/2016/03/Joy_Brennan-768x563.png 768w, https://educationaltechnology.ca/wp-content/uploads/2016/03/Joy_Brennan-410x300.png 410w" sizes="auto, (max-width: 998px) 100vw, 998px" /></a></p>
<p>Now, look at the fake profile:</p>
<p><a href="http://educationaltechnology.ca/couros/2706/joy_brenan" rel="attachment wp-att-2709"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2709" src="http://educationaltechnology.ca/couros/wp-content/uploads/2016/03/Joy_Brenan.png" alt="Joy_Brenan" width="1009" height="743" srcset="https://educationaltechnology.ca/wp-content/uploads/2016/03/Joy_Brenan.png 1009w, https://educationaltechnology.ca/wp-content/uploads/2016/03/Joy_Brenan-300x221.png 300w, https://educationaltechnology.ca/wp-content/uploads/2016/03/Joy_Brenan-768x566.png 768w, https://educationaltechnology.ca/wp-content/uploads/2016/03/Joy_Brenan-407x300.png 407w" sizes="auto, (max-width: 1009px) 100vw, 1009px" /></a></p>
<p>Do you see the important difference? The profile and header photos are the same in each. The friend count is certainly different. But the big thing is the spelling of the name. The authentic profile is &#8220;Joy Brennan&#8221; (two &#8216;n&#8217;s) and the fake profile photo is &#8220;Joy Brenan&#8221; (one &#8216;n&#8217;). The especially sneaky part is that if you were to try and search for fake Facebook profiles with your photos and name, this would make these much more difficult to find.</p>
<p>So why would the scammers do something like this? My guess is that they were hoping to perform a scam such as the common &#8220;<a href="http://www.scmp.com/article/611512/e-mail-hijack-new-twist-nigerian-scam">email hijack</a>,&#8221;Â where members of an existing friends/family network could eventually be tricked into sending money due to a contrived distress call (e.g., I was robbed while traveling, please wire me money).</p>
<p>So there you have it -Â a couple more scams to be concerned about. Oh, and Facebook still isn&#8217;t doing anything about these problems.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
