Walkthrough: Click at Your Own Risk
March 12, 2010
FPF Staff
Walkthrough: Click at Your Own Risk
FootballOutsider.com
By Mike Tanier
March 10, 2010
None of the scenarios listed below have happened yet, as far as we know:
- A star college quarterback sends a text message to five friends, bragging about his performance against a rival school. One of the friends forwards it to another set of friends, and one of them sends it to a few other people. The message finds its way to the blogosphere, then to ESPN. Soon football fans around the Internet are questioning the quarterback’s character and judgment for “distributing” inflammatory bulletin board material.
- An angry crank with an axe to grind against a top defensive prospect searches the Internet for dirt on his prey. An ordinary Google search turns up not just public data, but postings from the defender’s Twitter and Facebook accounts. The crank establishes an anti-prospect Web site, mixing out-of-context postings with some facts and a sprinkle of innuendo. Maybe he goes a step further, impersonating the player on a phony Twitter account and tweeting vitriol to a confused public. The line between what’s real and what’s fabricated is blurred by reporters and draftniks, who inadvertently cite some of the false or highly distorted information. The prospect’s reputation is tarnished by a cyber-smear campaign. By the time he realizes it, the damage is already done.
- A team hires an investigator to check out the top prospect in the draft, and the investigator isn’t above bending a few laws. In addition to standard background checks, he calls in a few favors with major Internet advertisers. He suddenly has access to the prospect’s “clickstream” information, a full record of the athlete’s browsing and chatting proclivities. Chat sessions at 3 a.m., just hours before kickoff? The general manager may find that interesting. Perhaps a GPS search of the player’s iPhone will provide other revelations …
Published:
Last Updated: August 31, 2020