UBC Streeters: 'Cyber Vetting'

Beware of the Whistler Scam

As the sun sparkles and the sultry peaks of British Columbia’s most sought-after mountaintops, it’s pretty easy to find yourself blinded by the beauty. Each year, Whistler brings in over 2.7 million tourists to bask in the wonder—and many activities—that the resort-town provides. It boasts everything from snowboarding to bungee jumping, and has the capacity to sleep over 30,000 visitors each night across the wide array of hotels, condos, chalets, and cabins.

But some of these fancy resting spots aren’t exactly what they’re cracked up to be.

Over the past few years, there have been numerous reports of scam-artists, posing as Whistler homeowners, taking advantage of unsuspecting tourists—and I once almost fell into the trap.

I was organizing a last-minute weekend trip to Whistler for my friends and I. After taking a long and hard look at the expensive hotels, I figured I’d turn to craigslist for a better deal. I had sifted through quite a few ads when I found a chalet for a more than reasonable price. The pictures looked luxurious—but it was the hottub on the balcony that really caught my eye.

I sent out an email to find out if the unit was still available. With the trip only being two weeks away, I figured it was highly unlikely that this prized suite would still be available. But to my amazement, the homeowner contacted me back shortly thereafter telling me it was ready to go.

I took a look at the paperwork (which was far from comprehensive, but what could you expect from a craigslist ad?), and after signing the dotted line, there was nothing left to do but make payment. But instead of dropping a credit card deposit, I was asked for the full payment—about $900 via an interac e-transfer—up front.

Now in many other instances, this writer might have noticed that he was up against a scam-artist. But after desperately scouring the Internet for nice place on short notice (not to mention that my eyes were salivating at the pictures) I was actually about ready to forward over my cash. Luckily, I ran the ad by my roommate for the sole purpose of showing off the ad and all its luxury. He immediately identified it as a scam.

As it turns out, many ads like this one exist. What generally happens, after someone makes payment, is that they are given an address—sometimes real or fake—as well as the key-code for the door. A meeting is never established with the ‘homeowner’—rather, they email you instructions on how to enter the house—usually just a key code for the door. But once you show up, the key-code for the house doesn’t work, and you quickly come to the horrific realization that you’re out a thousand dollars and a place to stay.

It soon became apparent that it was all too good to be true. I emailed the ‘homeowner’ just to be certain, and sure enough, he seemed desperate for my dollar—immediately slashing prices to try to entice me to make the deposit (FYI there’s no homeowner in their right mind that would rent out a 5 bedroom chalet for $200 dollars a night on a prime weekend in Whistler).

It’s common for students to get sucked into these scams, so next time you’re getting ready to book that weekend getaway with the gang, make sure you don’t fall into one of these traps. A good rule of thumb is to only make payments via credit cards due to their built in safety nets. At the end of the day, you might have to spend a little extra cash to make sure you and your friends have a good place to hang your hats after a long day on the slopes– but at least it won’t as expensive (and utterly disappointing) as falling victim to one of these scammers.

Has something like this ever happened to you? Hit the comment section below to share your story!

Open Access Week: a Social Media Snapshot

Last week, some of the greatest minds in Open Access met in a panel to discuss the success, challenges and future of open access in the forms of scholarly publishing, textbooks and education. Take a look at the social media timeline of the event below.

To learn more about Open Access, check out our webpage!

Are Private Groups Really Private?

It’s that time of year again—the first week of a brand new fall semester that screams ‘fresh start.’ Whether you’re sporting a brand new laptop for the year, or flaunting a new set of kicks (is that what the kids are still calling it these days?), the new school year always offers every student the opportunity to expand their knowledge, make some new friends, and pump up that GPA.

A helpful online tool that can facilitate all of the above comes in the form a slick and simple social media tool that many readers might already be a part of: the private Facebook group. When I began my master’s degree at UBC, my classmates and I were encouraged to rendezvous on Facebook. What followed is one of the most engaging and thought-provoking facets of my online presence: a private group that offers the opportunity for my cohorts and I to engage with one another without the scrutiny of professors, share ridiculous inside jokes, and even remind ourselves about upcoming assignments and offer help and tips. New posts are a notification that I always look forward to.

The private Facebook group can be a great tool for discussion between classmates, and even allows an easy way to organize casual hang-outs or weekend ragers. However, much like anything we do online nowadays, it’s never a bad bet to act with a certain degree of caution. After all, the tool does have a few weak links that might make you wonder if the groups really are private.

Facebook groups don’t have a traditional administrator—the person who creates them is the ‘administrator’, however they aren’t able to reject or accept new members before they can join. Any group member can add people to the group, without the discretion of the administrator. You can end up sharing your content with total strangers.

The only true way to protect your privacy in an online group is to routinely check the groups you belong to an all of their members. Ensure that you trust each group member, and it’s probably a good idea to make sure that whatever you share won’t tarnish your reputation if the information was made public.

Just last year, a private group of male Dalhousie dentistry students thought they were in the clear when they shared posts that suggested violence against their female cohorts. They may have felt comfortable sharing such remarks in a closed group, but a weak link in the chain (a student who was obviously disgusted by the posts) screen grabbed the posts and shared them with the CBC. In a few short moments, the posts were everywhere—online, TV, and the radio—and the university investigated the students shortly thereafter. It’s unknown whether they’ll ever be able to practice dentistry once they finish their education.

So please, don’t be like the Dalhousie dentistry students. Make sure that when you use this immensely useful social media tool that you don’t litter it with obscenities that might tarnish your name. Be responsible. Think before you ink.

Phone Security 101

Universities can be dangerous places. Exams, assignments, thieves and faculty lie in wait for the unsuspecting undergrad; of these, only theft can be (responsibly) avoided. This is important in the age of the smartphone; losing your device can lead to identity theft, bank fraud, and all sorts of scary-bad-no-fun situations.

What can students do to reduce risks? There are obvious (and less-obvious) measures that can be taken; we’ll outline the major points below.

First among these is locking your phone. Many of us choose not to password-protect our devices, but this can come back to haunt victims of theft. iOS users can find this option in Settings>General, while most Android users can find it in Location & Security Settings.

Another aspect of phone-sec is app-sec: making sure your apps are up-to-date and obtained from trustworthy sources (like Google Play and the App Store). Keeping your operating system updated is also a good idea.

Back up your data! This is a rallying cry for a reason. If the worst happens and you lose your phone, you don’t have to lose the information stored on it.

Remember to turn off Wi-Fi and Bluetooth if you’re not using them – they can drain battery life and might provide info-thieves access to your data. Logging out of websites (especially banking and shopping sites) when you’re done is good practice, as is keeping personal information to yourself.

Academics Anonymous

As we’ve said many times before, privacy is essential to academic freedom and free expression. Anonymous browsing is one way for academics to ensure their privacy online (to the extent that’s possible) and can be done in a number of ways; chief among these are virtual private networks (VPNs), proxy servers and TOR – a browser purpose-built to anonymize data transport developed by employees of the U.S. Naval Research Laboratory in the mid-90s. Each method has its own advantages and disadvantages for students, researchers, and academics-at-large.

Virtual private networks are private connections spread over the internet. These are handy for academics who travel, as they allow users to securely access resources remotely. They’re also useful for circumventing geo-restrictions and censorship (although the data can likely be monitored regardless), as many Canadian Netflix subscribers know. Beware, though – some VPNs turn your computer into an ‘exit node’, which can render you liable for the actions of others.

Proxy servers ‘bounce’ connections – they allow users to access resources indirectly by acting as an intermediary. Proxies can act as a quick workaround but are traceable in some cases (your IP and/or DNS can show up in headers); some of these are rumoured to be ‘traps’ to catch illicit activity.

TOR (alongside its associated browser) is a network that functions similarly to a VPN, allowing users to circumvent censorship and restrictions. It can be used to publish a site while hiding its location, communicate sensitive information, prevent tracking; all of these are beneficial. It also comes with its own set of associated risks; merely searching for information on TOR is rumoured to attract surveillance, and it only protects the transport of data. End-to-end timing attacks are still efficacious, and software (the aforementioned browser) is required to conceal your info from the sites you visit.

Students, researchers and academics-at-large can benefit from these modes of anonymity, but they should be aware of the associated risks – and that absolute anonymity and security is infeasible if not impossible.

Surveillance for students: a primer

What with nearly-omnipresent network surveillance and concomitant self-censorship, students (academics in general, really) face a new set of challenges to their freedom of expression and privacy.There are several areas here of particular concern for students; notable among these are copyright, academic freedom and privacy.  Even educational surveillance can create an atmosphere of distrust, detracting from learning and civil rights.

Students and faculty alike are often limited in terms of network access. Remember that you are bound by the terms of the network you’re using (your school, for example). If you’re connected to the Internet at all you may very well be subject to observation from third parties. This applies not only to your academic work but to your personal communications; consider the effect this might have on organized demonstration or activism, especially in the wake of a still-functional Patriot Act and the impending Senate vote on Bill C-51. It is essentially safe to assume at this point that (even with encryption) your data is not safe on computer networks.

What about institutional protection? In the United States, FERPA (Family Educational Rights and Privacy Act) governs access to educational records and students’ personal information, yet does not protect against the use of this data for profit. Under FERPA students have the right to review, change and control disclosure of their records (to some extent). In Canada the equivalent policies are provincial in scope, but very similar to FERPA in purpose. in BC and Ontario, this is the ‘Freedom of Information and Protection and Privacy Act’, or FIPPA.

Surveillance and censorship – direct or indirect – are detrimental to the ability of students to collaborate and learn, especially in an online environment. Educational institutions should prioritize the protection of student data, especially when that data is not anonymized; students, in turn, should demand accountability from their institutions while informing themselves about their learning environments.