Incident: Ineffective Age Verification Measures on Social Media Platforms

Published Date: 2021-01-27

Postmortem Analysis
Timeline 1. The software failure incident regarding the ineffective age-verification protocols on social media platforms was reported in an article published on 2021-01-27 [109677]. Therefore, the software failure incident likely occurred in January 2021.
System 1. Age-verification protocols implemented by social media platforms [109677]
Responsible Organization 1. Social media platforms such as Snapchat, Instagram, TikTok, HouseParty, Facebook, WhatsApp, Viber, Messenger, Skype, and Discord were responsible for the software failure incident related to ineffective age-verification protocols [109677].
Impacted Organization 1. Children using social media platforms [109677] 2. Parents and guardians concerned about their children's online safety [109677] 3. Social media platforms and app providers who need to enhance their age verification mechanisms [109677]
Software Causes 1. Ineffective age-verification protocols on social media platforms allowing children to easily circumvent the measures by simply stating they are older than they are without any proof of age required [109677].
Non-software Causes 1. Lack of effective age-verification protocols on social media platforms, allowing children to easily circumvent the measures [109677].
Impacts 1. The software failure incident led to children being able to easily circumvent age-verification protocols on popular social media platforms, exposing them to privacy and safety threats such as cyberbullying, online grooming, and exposure to inappropriate content [109677]. 2. The failure resulted in underage children being able to create accounts on social media platforms by simply stating they are 16 or older without any proof of age required, leading to a lack of age verification and future checks [109677]. 3. The incident highlighted the risks of children being exposed to grooming and harmful content online due to the ineffective age-verification measures [109677]. 4. The study found that even alternative forms of age verification, such as biometric and voice analysis, had limitations and were not reliable enough to prevent underage users from accessing age-restricted features [109677].
Preventions 1. Implementing more robust age verification methods that go beyond simple self-reporting, such as incorporating biometric or voice analysis technologies [109677]. 2. Making age-verification an ongoing process rather than a one-time check during sign-up to ensure continued compliance with age restrictions [109677]. 3. Applying the strictest privacy settings by default for users who declare themselves to be under 18 to enhance protection for minors [109677].
Fixes 1. Implement more effective age verification mechanisms that are not easily circumvented by tech-savvy children [109677]. 2. Consider using age assurance measures that estimate the likelihood of a user being a child to provide additional protections [109677]. 3. Set default privacy settings to protect underage users from abusers [109677]. 4. Provide clearer explanations of age-restricted features to users [109677]. 5. Apply the strictest privacy settings by default to users who claim to be under 18 [109677]. 6. Encourage honesty among users when providing age information [109677]. 7. Develop much more robust and reliable age verification methods, potentially exploring biometric security measures that are accurate and difficult to bypass [109677]. 8. Make age verification an ongoing process rather than a one-time check during sign-up [109677].
References 1. Lero, an Irish software research center [109677] 2. Dr. Liliana Pasquale from University College Dublin [109677] 3. Andy Burrows, NSPCC Head of Child Safety Online Policy [109677]

Software Taxonomy of Faults

Category Option Rationale
Recurring unknown The articles do not provide information about a specific software failure incident happening again at a particular organization or across multiple organizations. Therefore, the information related to the recurrence of a software failure incident within the same organization or across multiple organizations is unknown.
Phase (Design/Operation) unknown The articles do not provide specific information about a software failure incident related to the development phases, whether it be design or operation. Therefore, it is unknown whether the failure was due to contributing factors introduced by system development, system updates, or procedures to operate or maintain the system (design), or if it was due to contributing factors introduced by the operation or misuse of the system (operation).
Boundary (Internal/External) within_system (a) within_system: The software failure incident related to age-verification protocols on social media platforms is primarily within the system. The failure lies in the ineffectiveness of the age verification methods implemented by the platforms themselves, allowing tech-savvy children to easily circumvent these measures by simply stating they are older than they are without any proof of age required [109677]. The study conducted by Lero, an Irish software research center, highlighted the shortcomings of the current age verification processes within the platforms, emphasizing the need for more robust and ongoing verification methods to address this issue.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident related to non-human actions in this case is the ineffectiveness of age-verification protocols on social media platforms. The study conducted by Lero, an Irish software research center, found that tech-savvy children were able to easily circumvent these age-verification measures without the need for human intervention [109677]. (b) On the other hand, the software failure incident related to human actions is the dishonesty of children when setting up accounts on social media platforms. The study revealed that for all ten apps analyzed, if a child simply claims to be 16 or older during the account setup process, there is no proof of age required, leading to underage children gaining access to these platforms due to their own dishonesty [109677].
Dimension (Hardware/Software) software (a) The software failure incident related to hardware: - The article does not mention any specific software failure incident related to hardware issues [109677]. (b) The software failure incident related to software: - The article discusses a software failure incident related to age-verification protocols on social media platforms. The study found that tech-savvy children were able to easily circumvent age-verification measures on popular social media platforms like Snapchat, Instagram, TikTok, and others. This failure in the software's age-verification process allowed underage children to create accounts by simply stating they were older than they actually were, without any proof of age required [109677].
Objective (Malicious/Non-malicious) non-malicious (a) The objective of the software failure incident was non-malicious. The failure was due to contributing factors introduced without intent to harm the system. The age-verification protocols put in place by social media sites were found to be ineffective and easily circumvented by tech-savvy children, leading to children being exposed to privacy and safety threats such as cyberbullying, online grooming, or exposure to inappropriate content [109677].
Intent (Poor/Accidental Decisions) poor_decisions The intent of the software failure incident related to the age-verification protocols on social media platforms can be categorized as poor_decisions. The failure was due to contributing factors introduced by poor decisions made in the design and implementation of the age verification processes on popular social media platforms. The study found that children could easily circumvent these measures by simply stating they are older than they actually are during the account setup process, with no proof of age required [109677]. This lack of robust age verification methods and the reliance on self-reported age information led to the failure of the intended purpose of protecting children from potential online risks.
Capability (Incompetence/Accidental) development_incompetence, unknown (a) The software failure incident related to development incompetence is evident in the article where it discusses how age-verification protocols put in place by social media sites are ineffective and easily circumvented by tech-savvy children. The study conducted by Lero, an Irish software research center, found that children can easily bypass age verification measures on popular social media platforms like Snapchat, Instagram, TikTok, and others by simply lying about their age without any proof of age required [109677]. (b) The software failure incident related to accidental factors is not explicitly mentioned in the provided article.
Duration temporary The software failure incident discussed in the articles is more related to a temporary failure rather than a permanent one. The failure is temporary because it is due to contributing factors introduced by certain circumstances but not all. Specifically, the failure is related to the ineffectiveness of age-verification protocols on social media platforms, allowing tech-savvy children to easily circumvent these measures, leading to children being exposed to privacy and safety threats [109677]. The failure is not a permanent one as it is not a result of all circumstances but rather specific vulnerabilities in the age-verification processes of social media platforms.
Behaviour omission, value, other (a) crash: The articles do not mention any specific instances of software crashes where the system loses state and fails to perform its intended functions. (b) omission: The articles highlight a failure related to omission where children are able to bypass age verification measures on social media platforms by simply stating they are older than they are without any proof of age required. This omission leads to underage children gaining access to accounts without proper verification [109677]. (c) timing: The articles do not mention any specific instances of software failures related to timing, where the system performs its intended functions but at the wrong time. (d) value: The failure related to value is evident in the articles where the software systems are performing their intended functions incorrectly by allowing underage children to access social media platforms without proper age verification, exposing them to privacy and safety threats [109677]. (e) byzantine: The articles do not mention any instances of software failures related to byzantine behavior, where the system behaves erroneously with inconsistent responses and interactions. (f) other: The other behavior observed in the articles is the ineffectiveness of the current age verification methods on social media platforms, leading to children being exposed to risks such as cyberbullying, online grooming, and inappropriate content due to the lack of robust age verification mechanisms [109677].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence theoretical_consequence The articles do not mention any specific consequence of the software failure incident related to death, harm, basic needs, property loss, delay, or impact on non-human entities. However, the articles discuss the potential risks and consequences of children being exposed to privacy and safety threats such as cyberbullying, online grooming, or exposure to inappropriate content due to the ineffective age-verification protocols on social media platforms [109677]. The study highlights the risks of children being exposed to grooming and harmful content due to the ease with which young people can bypass age verification measures [109677]. The experts recommend implementing more effective age verification mechanisms to protect children from such risks [109677].
Domain information The software failure incident reported in the provided article is related to the industry of information (a). The incident specifically pertains to the failure of age-verification protocols on social media platforms, which are crucial for protecting children from privacy and safety threats such as cyberbullying, online grooming, and exposure to inappropriate content [109677].

Sources

Back to List