Computers Windows Internet

Methods of dissemination of information on the Internet. What to do with the spread of negative information about the company? How to neutralize it? How to spread information about a person

Any computer connected to the Web can, in principle, access a site that is physically located arbitrarily far away. In terms of speed, there is no difference whether the site is located on a neighboring table or on a neighboring continent.

If the information got on the Internet and seemed interesting to one of the users, it can be instantly distributed by any interested person to a theoretically unlimited number of Internet sites of various kinds (such as websites, blogs, forums, and a number of others, which we will discuss in detail below). On websites and forums, this is facilitated by mechanisms for tracking changes using RSS feeds, and on blogs, a system of friends subscribed to new messages. As soon as the information appears in the blog, it becomes automatically available to everyone who is subscribed to read the messages posted in it. Each of the bloggers usually has its own subscribers, the number of which ranges from a few people to several hundred. Thanks to this structure, news that is of interest to a large number of people can be distributed almost instantly. If this happens, then such messages fall into the field of view of special sites that control the most popular news (they track the information that users paid attention to, the number of which exceeds a certain threshold). From there, the message is automatically included in specialized mailing lists and goes to mailboxes, the owners of which may not be fond of Internet surfing, but are subscribed to newsletters. Electronic mailings form the second, no less large-scale, wave in the dissemination of information. Internet news agencies are able to additionally connect to the dissemination of information at any stage, if they consider it an interesting information occasion for themselves.

It is technically possible to distribute information on the Internet anonymously

Whether we like it or not, anonymous distribution of information on the Internet is indeed possible. Some consider it evil, others consider it a blessing. As a rule, the victims of such distribution are dissatisfied, and those who wish to bring to the attention of the public their hostile attitude towards a person or enterprise positively assess the preservation of anonymity on the Internet.

When a terminal (computer or mobile phone) goes online, it always receives a so-called IP address. According to the definition of Wikipedia, a network encyclopedia compiled by the entire Internet community, “an IP address (IP address, short for Internet Protocol Address) is a unique identifier (address) of a device (usually a computer) connected to a local network or Internet." This address is truly unique. No two computers have the same IP address on the Internet. It is by IP addresses that computers transmit information to each other, so if two computers have the same IP address, it will become unclear to which of them it is intended. The distribution of IP addresses is carried out by authorized organizations. A pool of addresses in a certain range is assigned to a specific Internet provider, so the provider and the city from which the computer went online can always be determined by the IP address. An IP address can be fixed or dynamic. A permanent one is assigned to a specific user, a dynamic one - one of the free ones at the moment - is issued by the provider to its customers in response to a specific request to access the Internet. In the case of using a permanent IP address, information about who it is assigned to can often be available to anyone. If a dynamic IP address is used, this information will only be known to the ISP, and even then not always: although the ISP knows from which terminal the exit was made, this does not guarantee the identification of the user. So, when accessing the Internet from a landline phone, its subscriber number and the address where it is installed are known. When exiting from a mobile phone - the subscriber number and personal number of the telephone set (the so-called IMEI), and when accessing the Internet from a leased line, the provider knows at what address the terminal connected via this line is located. However, if access to the Network was carried out from an Internet cafe or through a public Wi-Fi access point (in a cafe, at a train station, or even from a car parked near them), or from a mobile phone registered to a front person, it becomes very difficult to find a specific person. or even impossible.

An ISP can legally disclose subscriber information only to law enforcement agencies upon their request. Otherwise, it violates both the Federal Law “On Personal Data” and a number of departmental regulations.

The problem of finding a person who accessed the Internet is exacerbated by the fact that IP addresses are not always broadcast directly. For example, when using GPRS from a mobile phone, as a rule, everyone who uses this service in a cellular company has one IP address. In the same way, everyone who accesses the Internet through a so-called proxy server (this is often found in Internet cafes, educational institutions and large office buildings) has one IP address.

In addition, there are programs specifically designed to cover IP addresses - anonymizers. At their core, these are proxy servers designed specifically to provide anonymity on the Internet. Some of them (for example, Steganos Internet Anonym VPN) even provide encryption of transmitted information, which does not allow intercepting it on communication channels. When trying to identify a person who posted text or other information on the Internet using an anonymizer, a number of steps must be taken. First contact law enforcement. They must initiate a criminal case (if there are signs of a crime) and convince the Prosecutor General's Office to write a reasoned request to the law enforcement agencies of a foreign state that owns the anonymizer's IP address. This request must be completed in compliance with all necessary formalities, otherwise it will not be accepted for consideration abroad at all. It must clearly follow from the request that it is not politically tinged, otherwise, according to established practice, many countries will also not accept it for consideration, regardless of the correctness of execution. After that, law enforcement agencies of a foreign state will contact the company providing anonymizer services and demand to provide information about the IP address from which they connected to it. In the course of this whole complex of activities, which will take a lot of time, only the address from which the enemies connected to the anonymizer will be found out. But anonymizers can also be arranged in a chain, when connection to one of them is made through another ...

In addition to what has already been said, it should be noted that there is a distributed anonymous Tor network, which is created and maintained by privacy advocates. This computer network on the Internet is organized in such a way that it is almost impossible to track the movement of a data packet from its starting point to its destination.

That is why for most cases, if they do not concern international terrorism, when all the forces of the special services of large countries are coordinated to capture the villain, we can say that it is technically possible to ensure anonymity on the Internet.

Although we have given an overview of the main methods of ensuring anonymity on the Internet here, for the convenience of readers, we will describe them in more detail in a separate section.

Offline mechanisms to counteract the dissemination of information do not work online

Creating a blog takes 15 minutes. Creation of a workable site that does not claim to be nominated in a web design competition - from 40. Site transfer to a new hosting - from several seconds to several minutes.

Off-line during this time it is impossible even to write a statement of claim. Moreover, at the time of writing the book, it was possible to open hosting (that is, buy a place on the server where the site will be hosted) anonymously, using transfers through payment systems that do not require identification as payment. And if hosting is ordered in another country, then off-line procedures for influencing it become no less laborious than those described in the previous section on establishing the real IP address of the enemy. These are very lengthy and sometimes expensive procedures, the result of which may be a court decision to close the hosting, after which, as we have already said, nothing prevents it from being reopened in another country, and within a few minutes the site that was fighting will again be on the air. In addition, it is not at all a fact that a lawsuit against a site with black PR will be won. After all, if negative information is not slander or insult, but personal opinion, and if no laws are violated (for example, on the inadmissibility of publishing personal data without the direct consent of the person to whom they belong), then the court may not decide on it at all. removal.

The Internet is a "washing machine" for negative information

If a media outlet publishes false information that defames someone, the victim can go to court and have a chance to receive compensation, as well as force the media to publish a retraction. And although the system that exists today, even in respected publications, is not perfect in everything (for example, in practice, a journalist who considers himself a "shark of the pen" can post unverified information - and no one will control his actions), you can still try to call the media to account. It is difficult, long, but possible. But when the Internet is flooded with information of this kind, after which the media begin to write about this fact (“Information appeared on the Internet that ...”), there is usually no one to hold accountable.

Almost ten years ago, Gleb Pavlovsky was one of the first to note this feature of the Internet: “The Internet is an ideal tool for launching the necessary stories into the mass consciousness. In addition, traditional media are responsible for the information they disseminate. Rumors transmitted over the Internet are anonymous. But newspapers and television get the opportunity to refer to the Internet. That is, there is a real laundering of the so-called black information.”

Until recently, even the online media could not be held accountable. When applying to the court, it was required to send a copy of the statement of claim to their address, and by the time of the court hearing, the information from the site disappeared. True, recently it has become possible to notarize a copy of the image of the information posted on the site. As a result, even if this or that text is removed from the site by the time of the trial, this does not save the electronic media from liability. It's probably a win. However, it is so small that it does not solve the problem as a whole.

Information on the Internet can be stored forever and some of the archives are publicly available

When a user posts information on the Internet, he often loses control over it without even realizing it. The phrases “The word is not a sparrow, it will fly out - you won’t catch it” and “What is written with a pen, you can’t cut it down with an ax” are fancifully combined here and have acquired a new meaning today. Indeed, by writing something on someone else's Internet forum or commenting on someone's online magazine, the user can completely lose control over his words. Even if someone believes that, if necessary, he can remove the information posted by him, it is not a fact that this is actually possible. It is enough for any person to simply copy the words given in the message so that the authority of the author over this message is lost. Perhaps forever.

But even if the information is posted on the user's own website, he may sooner or later find that he is unable to remove it from the Internet. This most often happens for four reasons.

1. Information is archived on the Internet. Indeed, on the Internet at: www.archive.org/ there is a resource that copies the pages of sites and saves them on their servers. Since it is located in San Francisco and belongs (at least officially) to a private individual, it is unlikely that there is an opportunity to easily “clean up” information there at the request of organizations or individuals without a decision of an American court. Here is an excerpt from the "Internet Archive" article from Wikipedia:

The Internet Archive is located in San Francisco, founded in 1996 and has several projects. The archive provides free access for researchers, historians and schoolchildren. The declared goal of the archive is to preserve the cultural and historical values ​​of civilization in the era of Internet technologies and to create an Internet library.

The Wayback Machine - the content of web pages is stored in the database, and you can see how this or that page looked before, even if the site no longer exists. In October 2004, The Wayback Machine was first recorded as evidence in an American court. Censorship has also been noticed, when some of the archival copies of web pages containing criticism of Scientology were removed from the archive at the request of lawyers from the Church of Scientology.

In order to see the possibilities of the Internet archive, we present the images of the websites of RosBusinessConsulting (www.rbc.ru) dated December 10, 1997 and Most-Bank (www.most.ru) dated January 16, 1997 stored there (Fig. 2, 3 ).

Later we will talk in more detail about how to use this service.

2. Information is reprinted by another user.

Any person, company or news agency can reprint the words of the user with a link to the source and comment on them.

The words of an Internet forum user may be quoted by another member of the same forum and thus get out of the control of the author. The author can ask them to remove the person who quoted or the moderator of the forum, but it is not in his power to force anyone to comply with this request.

Rice. 2. RosBusinessConsulting website dated December 10, 1997 in the Internet archive.



Rice. 3. Site of the Most-bank dated 01/16/1997 in the Internet archive


3. The user's message gets into the so-called tops of various resources and stays there. This phenomenon is typical mainly for blogs. As soon as any topic starts to be discussed actively enough, it is fixed by special sites and its copy is placed there in sections like TOP-30 of LiveJournal for such and such a number. Often, news from these sites gets into thematic mailings and is distributed to all subscribers in different cities and even countries.

Many resources on the Internet have become interactive. Indeed, even ten years ago, an ordinary person or a poor enterprise could not get the opportunity to express their point of view on certain events or problems. Today, examples are appearing on the Internet showing that anyone can do it so “loudly” that it will be heard all over the world and get help if necessary. People who did not know each other yesterday, in an instant unite by a common idea or attitude to some problem and begin to speak together.

If the topic is interesting, users can join the discussion on their own or even take part in offline decision making. The potential impact of the interactive Internet on real life is clearly seen in the example of such harmless resources as the Darom community in LiveJournal (LJ, or Livejournal), www.community.livejournal.com/darom/ and the Flashmob LiveJournal community (www. community.livejournal.com/fmob/).

Here is a description of the "Darom" community given in its Journal:

If you have found a good but unnecessary thing in your house that it is a pity to throw it away, but there is nowhere to put it, and also if there is a need for something, you can leave a message in this community. Surely there is a person who will be ready to give you the necessary thing.

Here you can leave announcements: “I will give for free”, “I will accept as a gift”, “I will exchange” or “quid pro quo”. There are no strict restrictions, except for “buy / sell” announcements.

Be sure to indicate the city in which you are located, or the possibility of sending by mail. If you do not specify the city, then this will be equivalent to the signature "Mr. Moscow".

If the item has already found its new owner or the item is no longer needed, then do not forget to indicate this in your ad.

Attention!

1. Announcements about the distribution of kittens and puppies are strictly prohibited. To do this, there are more than 90 communities where people are interested in kittens, more than 400 in cats, more than 40 in puppies and almost 300 in dogs. This prohibition does not apply to other animals.

2. It is forbidden to post messages like “tell me please”, “tell me for free”, opinion polls and so on. For this, there is a special community podskajite_plz, I have no doubt that there will always be more people who want to give good advice than those who ask it.

Description from Flashmob Community Magazine:

Briefly about Flashmob

A flash mob is a mechanism... a mechanism that allows, at the expense of dozens, hundreds of people who do not know each other, to simulate a situation that simply cannot happen in reality. This is not just an opportunity to create an unusual situation, it is an opportunity to CHANGE REALITY! Having agreed on this site, we suddenly appear in crowded places and execute our scenarios. We surprise, puzzle, frighten, delight and disappear - see you again

Flash mob rules

1. Do not talk about the flash mob before, during or after the action.

2. Carefully study the script in advance so as not to get confused and not mix up anything on the spot.

3. DON'T LAUGH DURING THE FLASHMOB PROMOTION

4. Don't come with friends; don't say hello if you meet someone you know.

5. Strictly follow the instructions in the script. Never try to stand out.

6. Set your watch as accurately as possible. Be there 10 seconds before the start of the flashmob action.

7. Do not stay at the action site after the end of the flash mob.

8. To the question: “What is going on here?” answer: "I'm here by chance ... I saw - and joined."

9. Photo and video filming should be carried out extremely secretly, but it is better to refuse it altogether.

The example of these two communities shows that on any issue that is interesting to people, a team of like-minded people can be quickly created. Such a team can act in a coordinated manner, and its members do not interfere with the fact that they may be unfamiliar with each other. If the solution to a common problem requires the physical presence of participants, geographical remoteness still limits the possibilities of the team, but when it comes to disseminating information on the Internet, there are no obstacles at all. The social network, represented by the members of the informal collective, disseminates information quickly and widely. But to counteract such a lightning-fast dissemination of information around the world is extremely difficult, and most often impossible at all.

4. State borders are preserved in real life, but practically erased in virtual. We have already touched on this issue, talking about what efforts are required to legally obtain information about the user's IP address in another country or influence the company that provided its server for the enemy's website. In addition, in some cases there may not be an agreement on the interaction of law enforcement agencies with this country, or according to its laws, the act of your enemy is not something reprehensible. Perhaps it is located on the other side of the globe or it is restless in it, so for reasons of financial or personal security, you will consider it inappropriate to fly to it to establish contacts on the spot. Finally, it may be that this country has a difficult political relationship with Russia, and therefore it will enthusiastically put the spokes in the wheel on any issue that involves helping Russian businesses, citizens, government or law enforcement agencies.

Thus, an attempt to prevent the dissemination of information on the Internet may very well run into serious barriers in the form of state sovereignty and differences in laws, while those who disseminate this information usually do not face such problems.

The Internet is much more democratic than real life

This has both significant advantages and significant disadvantages. Real life forces a person in any country to behave with an eye to the possible consequences of his behavior. Even in countries with developed democratic institutions, a person is forced to think about how his actions or statements will be perceived by others.

On the Internet, these limiters are often not available at all, or they are, but they are much less than in "real life". As a result, any person can express his point of view to the whole world (and it does not matter whether it is correct or not), and under certain circumstances, he is no less likely to be heard than a serious news agency. After all, it is not for nothing that news agencies on the Internet have appeared and are actively working today, in which the news rating is determined by the readers themselves, and not by the editor. This is the so-called social news (social news not by topic, but by the algorithm for determining the rating of news by the whole community). News2.ru (www.news2.ru/) or smi2.ru (www.smi2.ru/) can serve as an example of such resources in Runet, the popularity of which, according to researchers, is constantly growing. True, such resources, like any open system, are constantly in danger of cheating results for advertising purposes, so some of them again begin to be strictly moderated when posting news, such as, for example, weblinks.ru (www.weblinks.ru/). In our opinion, the trend in the development of social news services is obvious, and as such services become known among the general public, the likelihood of distortion of the results by interested parties will significantly decrease. This can be seen in the example of foreign analogues. It has already been proven in practice that events that concern a large number of people are widely commented on by ordinary Internet users in real time. At the same time, the degree of confidence in what was said is incredibly high. An example is the situation with Hurricane Katrina in New Orleans. To illustrate, here is a fragment of the article "New Orleans bloggers accomplished a journalistic feat", posted on the well-known Russian resource CNews.

Bloggers on the pages of their Internet diaries described Tropical Storm Katrina first-hand in real time and no less vividly than the mainstream media.

A diesel generator, a computer, and a cell phone were all bloggers needed to get online before cell phones went down. “Trees are falling everywhere. Three trees fell on a neighbor's house. Southern Yacht Club burned to the ground,” wrote Troy Gilbert on the Gulfsails blog.

Bloggers are increasingly becoming the most important source of information about the world's emergencies. The heyday of the blogosphere in the United States occurred during the presidential election last year, when the process was described by authors from different parts of the country. The audience of blogging sites during important events is growing - people are more likely to search the Internet for information that goes beyond news sites. For example, comScore's Media Metrix recorded 1.7 million online searches for "hurricane" and/or/ "Katrina" on August 29, 10 times more than in the five days of August 22-26.

"Bloggers outside the disaster area are doing everything they can to increase the dissemination of first-hand information," said NYU professor Mark Crispin Miller. Richard Lucic, professor at Duke University, says blogs, podcasts and other new technologies bring news "at the human level" because anyone can do it with very little investment and no training.

We do not in the least detract from the dedication and resilience of the New Orleans bloggers, but we want to note that there is almost never even an attempt to verify the veracity of the facts set forth in such cases. This is partly due to the fact that there is no possibility of verification in principle, partly due to the fact that people simply do not think about the need to double-check information if it seems exciting and urgent to them. But in any case, for the manipulators of public opinion, this situation opens up dizzying prospects.

In fairness, it should be noted that the first revelations of bloggers publishing "true" fried facts have also already been recorded. Although, of course, it is not known how many such facts have remained undisclosed. Here is an article by a well-known blogger and journalist Anton Nosik, who writes blogs under a nickname (pseudonym).

For those who rarely look at blogs and Internet forums, we remind you that a nickname is a virtual name. In principle, it can be anything, but within the same blog site it must be unique, that is, if someone chose a nickname that you like before you, then you will have to come up with another one. The nickname chosen by you, accordingly, cannot be chosen by anyone else on this blog site. Let us also clarify some of the terms found in the article below. "Photozhaba" is a well-known program "Photoshop" (Photoshop), which allows you to mount images and make any changes to them. "False user" - a user of LiveJournal, which in English is called LiveJournal, and in Russian transcription - LiveJournal, or LZh.

Fotozhaba moved to Gaza

Fadel Shada, a Reuters employee in Gaza, and his colleague working for Iranian TV declared themselves victims of an Israeli rocket attack.

The Association of Foreign Journalists in Israel was quick to label the attack "outrageous targeting" and demanded a thorough investigation.

Apparently, in vain. Because the analysis of the testimonies cited by the “victims” showed that it was a staging.

Here is how the false user akog tells this story.

And here are the English blogs that he used in preparing the material: MyPetJawa, PowerlineBlog (update), Snapped Shot, Confederate Yankee.

A separate interesting story to the issue of staged filming of the destruction is the staging of an Israeli strike on Lebanese ambulances.

How to disseminate information about the events of the Snail Center?

The activity of each Coordinator of the Snail Center begins with the fact that information about a remote event must reach children, parents and other educators. This is a very important part of your work, dear Coordinators. And we want to help you with our advice and recommendations.

The means by which information is disseminated may vary. Here are some of them:

1. Placement of ads on the stands in your office, in the teacher's room, and other stands in the educational organization.

How to implement: download, print and post.

If necessary, check with the administration in advance. Event schedules can be placed on the standsfor half a year / year, indicating in the note field your name as the Coordinator of the Snail Center and your office number, flyers-announcements about individual events also with information about you, .

2. Presentation of award materials and prizes participants of distance competitions and olympiads at school-wide events.

How to implement: contact the administration with a request to allocate time for you at a school-wide event for the presentation of award documents to students.

During the presentation, you need to talk about the importance and usefulness of children's participation in remote events, about the achievements of the recipients. To additionally mention the Snail Center Grants,some upcoming events, invite everyone to participate.

3. Speaking at meetings teaching staff and parent meetings.

How to implement: contact the leader of the meeting with a request to allocate time for you to talk about the distance competitive movement and the results of the participation of your students and your colleagues in it.

Your presentation may consist of several parts: a story about the remote competitive movement, a story about the successes of your children and colleagues, presentation of award documents, a story about the Snail Centerand its events, about the Snail Center Grants.

4. Dissemination of information on the Internet: in social networks, on the website of an educational organization, in your blog, and other pedagogical platforms.

How to implement: share information from the website of the Snail Center and from the communities of the Center in social networks.

The site has a special page,which contains various banners that can be placed on the website of your educational organization or on your personal website / blog.

When distributing information, do not forget to indicate yourself as the Coordinator so that everyone who wants to come to you.

Remember: more participants - more bonuses, more chances to get a Grant!

Read more for more helpful tips and resources:

Our advice is purely advisory in nature. Each Coordinator can organize his work in his own way, in accordance with his individual conditions. Take our advice creatively, projecting it onto yourself and your students. But do not forget that the work of the Coordinator must be clearly organized in order to be effective and bring moral and material satisfaction.

All your questions will be gladly answered by our Care Service, write to us

Follow our news, announcements, read useful materials in our weekly newsletters. If you do not receive them, please also contact the Care Service.

Hello dear reader!

This variant of solving the problem of counteracting the spread of negative information is similar to the methods of work of a bad doctor. Imagine, dear reader, how a person comes to the doctor with a headache and asks for help. The doctor, after listening carefully, prescribes treatment, prescribing expensive drugs. Doesn't this, by any chance, remind you of the work of a marketer who reports to management about what customers were unhappy with, and then about proposals for improving the situation and the budgets that are needed to implement the proposals? Agree, dear reader, that there are commonalities in the work of a bad doctor and a marketer. Let's think about it and try to figure out what this work will lead to.

Now let's look at this example, how we managed to neutralize the flow of negative information. When the coefficient was introduced at the stage of sales planning, the situation when there is a shortage of the most demanded products was resolved. The customer, getting what he wanted, could no longer say that this company does not have what he needs. On the contrary - the customer could say that he can always buy what is required. The flow of negative information has stopped.

Let's return to our topic - negative information, how to deal with it and how to neutralize it. As an adherent of a systematic approach to solving problems, I can say the following... Any problem related to the dissemination of information, especially negative information, must be solved systematically! Problems of this type can be solved in three ways. (see fig. 1).

Rice. 1. Ways to solve problems.

As can be seen from the diagram in Figure 1, each of the methods works at its own time. This does not mean that if you see a deterioration in the situation, then you have to wait until the consequences come in order to take action. Solving the problem using method 3 is the most difficult and costly!

First way. Allows you to significantly minimize losses from negative information, and ideally reduce them to zero. This is a way for those who are used to working ahead of the curve, thinking through in advance all the possible consequences of their actions, the actions of their subordinates and colleagues. We can say that this is prevention. After all, the disease is easier to prevent and take preventive measures than to treat or, moreover, deal with complications after the disease. Thus, at this stage, we try to prevent the formation of situations that may cause negative information.

The second way. Unfortunately, not everything in business can be foreseen. There are circumstances that cannot be predicted. It is quite clear that some of these circumstances can cause negative information to appear. We failed to prevent the disease. Now it is necessary to start treatment as soon as possible in order to avoid complications. At this stage, we solve two problems at once. First, it is necessary to eliminate the cause of the negative information. Secondly, it is necessary to neutralize the negative of customers, which has already formed.

Let me give you another example from my practice. Early in my career, I worked for an IT equipment supply company. In mid-November, one of my clients placed an order for equipment, which I, in turn, had to order from abroad. Being, in those days, a person with little experience, I boldly told the client that his equipment would be delivered to him before the end of the year. Alas, I was wrong. I did not take into account that in Europe, according to Catholic canons, Christmas is celebrated at the end of December, and not like ours. Therefore, from December 25, customs terminals in Europe do not work. My client's order is "stuck" at customs in Europe. At the end of December, I had a very unpleasant conversation in a raised voice with a client who was extremely annoyed that his order was “stuck” at customs in Europe. After long negotiations, we nevertheless came to a common decision. However, it cost me part of the profit - I had to give the client a solid discount. Relations with the client have improved.

It can be said that I solved the problem that confronted me in the second way. I lost money on one contract, but kept the client, with whom we had a lot of collaboration later.

The third way. The reason for the emergence of negative information was not predicted at stage 1 and was not neutralized at stage 2. Clients are so “offended” at you that they reduce the volume of purchases from you and increase volumes from your competitors, telling everyone around you what an incompetent partner they are and recommend have nothing to do with you. Here they are, the consequences of miscalculations !!!

What to do? First, let's answer another question. And is it necessary to do something at all? You, dear reader, may want to object to me, say: “Let me, if nothing is done, the company will inevitably collapse!!! It is urgent to take action!!”. And, of course, you will be, to some extent, right. But I propose not to discuss this topic, but to understand the essence of the problem. I am sure that any of your actions is aimed at the development of your company, its prosperity, its profitability. It is quite fair to assume that your decisions will seem right to some of your clients, while for others they will cause sharp rejection, criticism and negativity, especially when these decisions are put into practice.

Once I happened to observe the implementation of one solution aimed at customers. The company's management decided to restructure the company's client base. The restructuring was the following process:

  • ABC customer analysis;
  • Clients whose average monthly volume of purchases did not exceed the established minimum limit were offered to become partners of the second level (to make purchases not from the company, but from “larger” clients).

Of course, the "camp" of customers was divided into two groups. Those customers who still had the right to buy directly from the company were happy because the speed of order processing increased dramatically (“small” customers no longer took time from company managers, and this time was devoted to those customers who remained). Those clients who became partners of the second level were extremely dissatisfied, because for them the purchase prices became higher. This situation is shown schematically in Figure 2.

Rice. 2. Scheme of distribution of clients after restructuring.

The results of the restructuring showed that the company's turnover increased, while the workload of the company's managers decreased.

However, what about the negative information that is spread by clients who have become partners of the second level? To stop the spread of negative information, the company held a series of marketing campaigns aimed at developing second-level partners. As a result, all negative information was removed, further dissemination of negative information stopped.

Well, now I suggest you, dear reader, look at the spread of negative information and methods of counteracting its spread, as they say, at a glance and sum up:

  • We all live in time. Negative information does not arise by chance, spontaneously. Its occurrence is connected with our actions. Using the “3 Ways to Solve Information Dissemination Problems” method, it is possible to predict the appearance of negative information long before it appears and take measures to avoid such a development of events. Sometimes it may turn out that negative information and its dissemination will have such small consequences that the need to counteract this will be more resource-intensive than the elimination of the consequences of its dissemination.
  • If mistakes are made at the forecasting stage and the process of disseminating negative information is already in full swing, then, following the principles of a good doctor, it is necessary to deal with the causes that caused the disease. These can be revisions of the company's plans, and cancellations or adjustments of decisions made ... A lot of things. Everything depends on the situation.
  • If the mistakes made led to negative consequences, when the company has already begun to suffer losses associated with negative information and its dissemination, then time becomes the most important factor! The time that was lost before. Any steps to correct the situation must be clear and consistent. Throwing from side to side will only exacerbate the situation. At this stage, there is no time to first take steps to neutralize negative information, and then return the departed customers. At this stage, many processes will have to be done in parallel to each other, and it is extremely important to track that the processes do not contradict each other.

As an afterword. History knows many examples when negative information about a company is formed and distributed by the company itself. Some large companies do this deliberately, using negative information, for example, as a tool to create a competitive advantage or generate additional profits. Dear reader, you have come across such examples, haven't you? So maybe you and I should learn how to use them for the benefit of your company, what do you think?

It is technically possible to distribute information on the Internet anonymously

Whether we like it or not, anonymous distribution of information on the Internet is indeed possible. Some consider it evil, others consider it a blessing. As a rule, the victims of such distribution are dissatisfied, and those who wish to bring to the attention of the public their hostile attitude towards a person or enterprise positively assess the preservation of anonymity on the Internet.

When a terminal (computer or mobile phone) goes online, it always receives a so-called IP address. According to the definition of Wikipedia, a network encyclopedia that is compiled by the entire Internet community, “an IP address (IP address, short for Internet Protocol Address) is a unique identifier (address) of a device (usually a computer) connected to a local network or Internet." This address is truly unique. No two computers have the same IP address on the Internet. It is by IP addresses that computers transmit information to each other, so if two computers have the same IP address, it will become unclear to which of them it is intended. The distribution of IP addresses is carried out by authorized organizations. A pool of addresses in a certain range is assigned to a specific Internet provider, so the provider and the city from which the computer went online can always be determined by the IP address. An IP address can be fixed or dynamic. A permanent one is assigned to a specific user, a dynamic one - one of the free ones at the moment - is issued by the provider to its customers in response to a specific request to access the Internet. In the case of using a permanent IP address, information about who it is assigned to can often be available to anyone. If a dynamic IP address is used, this information will only be known to the ISP, and even then not always: although the ISP knows from which terminal the exit was made, this does not guarantee the identification of the user. So, when accessing the Internet from a landline phone, its subscriber number and the address where it is installed are known. When exiting from a mobile phone - the subscriber number and personal number of the telephone set (the so-called IMEI), and when accessing the Internet from a leased line, the provider knows at what address the terminal connected via this line is located. However, if access to the Network was carried out from an Internet cafe or through a public Wi-Fi access point (in a cafe, at a train station, or even from a car parked near them), or from a mobile phone registered to a front person, it becomes very difficult to find a specific person. or even impossible.

An ISP can legally disclose subscriber information only to law enforcement agencies upon their request. Otherwise, it violates both the Federal Law “On Personal Data” and a number of departmental regulations.

The problem of finding a person who accessed the Internet is exacerbated by the fact that IP addresses are not always broadcast directly. For example, when using GPRS from a mobile phone, as a rule, everyone who uses this service in a cellular company has one IP address. In the same way, everyone who accesses the Internet through a so-called proxy server (this is often found in Internet cafes, educational institutions and large office buildings) has one IP address.

In addition, there are programs specifically designed to cover IP addresses - anonymizers. At their core, these are proxy servers designed specifically to provide anonymity on the Internet. Some of them (for example, Steganos Internet Anonym VPN) even provide encryption of transmitted information, which does not allow intercepting it on communication channels. When trying to identify a person who posted text or other information on the Internet using an anonymizer, a number of steps must be taken. First contact law enforcement. They must initiate a criminal case (if there are signs of a crime) and convince the Prosecutor General's Office to write a reasoned request to the law enforcement agencies of a foreign state that owns the anonymizer's IP address. This request must be completed in compliance with all necessary formalities, otherwise it will not be accepted for consideration abroad at all. It must clearly follow from the request that it is not politically tinged, otherwise, according to established practice, many countries will also not accept it for consideration, regardless of the correctness of execution. After that, law enforcement agencies of a foreign state will contact the company providing anonymizer services and demand to provide information about the IP address from which they connected to it. In the course of this whole complex of activities, which will take a lot of time, only the address from which the enemies connected to the anonymizer will be found out. But anonymizers can also be arranged in a chain, when connection to one of them is made through another ...

In addition to what has already been said, it should be noted that there is a distributed anonymous Tor network, which is created and maintained by privacy advocates. This computer network on the Internet is organized in such a way that it is almost impossible to track the movement of a data packet from its starting point to its destination.

That is why for most cases, if they do not concern international terrorism, when all the forces of the special services of large countries are coordinated to capture the villain, we can say that it is technically possible to ensure anonymity on the Internet.

Although we have given an overview of the main methods of ensuring anonymity on the Internet here, for the convenience of readers, we will describe them in more detail in a separate section.

Offline mechanisms to counteract the dissemination of information do not work online

Creating a blog takes 15 minutes. Creation of a workable site that does not claim to be nominated in a web design contest - from 40. Site transfer to a new hosting - from several seconds to several minutes.

Off-line during this time it is impossible even to write a statement of claim. Moreover, at the time of writing the book, it was possible to open hosting (that is, buy a place on the server where the site will be hosted) anonymously, using transfers through payment systems that do not require identification as payment. And if hosting is ordered in another country, then off-line procedures for influencing it become no less laborious than those described in the previous section on establishing the real IP address of the enemy. These are very lengthy and sometimes expensive procedures, the result of which may be a court decision to close the hosting, after which, as we have already said, nothing prevents it from being reopened in another country, and within a few minutes the site that was fighting will again be on the air. In addition, it is not at all a fact that a lawsuit against a site with black PR will be won. After all, if negative information is not slander or insult, but personal opinion, and if no laws are violated (for example, on the inadmissibility of publishing personal data without the direct consent of the person to whom they belong), then the court may not decide on it at all. removal.

The Internet is a "washing machine" for negative information

If a media outlet publishes false information that defames someone, the victim can go to court and have a chance to receive compensation, as well as force the media to publish a retraction. And although the system that exists today, even in respected publications, is not perfect in everything (for example, in practice, a journalist who considers himself a "shark of the pen" can post unverified information - and no one will control his actions), you can still try to call the media to account. It is difficult, long, but possible. But when the Internet is flooded with information of this kind, after which the media begin to write about this fact (“Information appeared on the Internet that ...”), there is usually no one to hold accountable.

Almost ten years ago, Gleb Pavlovsky was one of the first to note this feature of the Internet: “The Internet is an ideal tool for launching the necessary stories into the mass consciousness. In addition, traditional media are responsible for the information they disseminate. Rumors transmitted over the Internet are anonymous. But newspapers and television get the opportunity to refer to the Internet. That is, there is a real laundering of the so-called black information.”

What I want to talk about does not refer to viral marketing, nor to the announcement of upcoming news. I want to explain what is

for communities and groups on sites where I am a member. An example is the groups on Subscribe.ru (here I am currently in 22 groups), Ya.ru (I am in eight groups), forums and other similar services.

Probably every webmaster, wanting to achieve good traffic to their sites, uses methods and technologies to promote pages in search engines: SEO optimization, buying links, disseminating information using social networking buttons and many other methods. Many distribute news to groups on popular sites and forums by adding topical news (articles) with a link that takes the reader to the site page where it is presented in full (source). The best option is to write a few lines about the essence of the material being added, but often without enough time (or just too lazy to rewrite the article), by simply copying the title and part of the content of the article using the left and right mouse buttons or Ctrl + C and Ctrl+V And then a simple transfer of the news is done with the addition of a link to the source.

But what to do and how to quickly spread the SAME NEWS to many groups at once?

A simple mechanical repetition of the same actions of copying and pasting a title, a picture of a part of the text and a link for one entry, with very good mouse and keyboard skills, takes a few seconds. What do I suggest?

This may raise a skeptical smile from some experienced computer users and its resources, but my method, I hope, can become a revelation for less experienced users and webmasters. The essence of the method lies in the fact that all operations must be carried out directly on the article page of the site, i.e. in its visual representation and by selecting the left mouse button of the part of the article. If desired, with a picture (pictures) placed on the page.

For example, this is how the beginning of the page looks like before selection:
And so after:
At the same time, the negative of the picture turned out :). Now it remains only to copy this entry and paste it in VISUAL mode into the editor on the page for adding news in the group. Then add a link to the source, and in the upper window - the title of the news. Finally, the button "Done", "Add news", etc. and finish the operation. It turns out five operations for each group: highlighting, copying, pasting content, adding a link, clicking on the add content button - that's it, for moderation.

Do all these operations for each group?

No, it can only be done once by creating a template on a page in any of the groups! Then, opening all the windows of all groups in turn, copying the content once (with the mouse or buttons), distribute it to all groups (and not necessarily one site) by pasting. Then copy the title (previously pasting it into any text editor such as "notepad") and paste it, again in turn, on the page of each of the groups. If there are many such groups, you will have to open many bookmarks. Most convenient in this case visual bookmarks. Personally, I leave all the most necessary pages for adding entries to site groups in visual ones. Now it remains only to “go over all the open tabs by pressing the “Finish” button, and without delaying waiting for the end of the operation on each of them - the system will do it itself.

By doing so, we reduce the addition of an entry for each page to three operations. The main thing in all this "mechanics" - drawing up a template on one page, and then full copying from the clipboard.

Along the way, I want to note right away that adding news in this way (full copying of part of the entry) is undesirable, especially if the page on your site was created recently and has not had time to be indexed in . It may happen that it will first be indexed on a third-party site (even if it is not completely copied) and will significantly slow down on yours. There is a personal bitter experience :(.

Considering that my attempt to present this simple technology will not seem entirely clear to the reader and he will not catch the point, I created a small video podcast, which demonstrates the entire scheme and sequence of actions of the above entry. We look:

Did you like my technology of high-speed mass distribution of information? Please speak up.
Bye Bye!

(Visited 182 times, 1 visits today)