ss_blog_claim=27c167cdb8f8a240a14959527b4317db Trolls, Flame Wars & CyberStalkers
Cyberbullies
Saturday, August 14, 2010
Case# #95 Minimize What People Can Find Out About You Online
People Search Engines: They Know Your Dark Secrets … and Tell Anyone
By JR Raphael, PC World
Privacy Pictures, Images and Photos

Social search engines can turn up your Amazon Wish List, photos of your kids, where your kids go to school, your address, your business, where you went to school, your musical tastes, your medical problems, all about your breakups & divorces, your mental health status and much, much more. What else is out there that you don't want everyone to know, and what can you do to protect yourself?


I know things about my lawyer I absolutely should not know. He's 55 years old, listens to the music of the band Creed, and screams like a little girl when riding roller coasters. He also relaxes with New Age spa treatments and is thinking about getting an electronic nose-hair trimmer. And that's just the start.

Now, let me be clear: I've never spent a single moment outside the office with this guy (and for what it's worth, I'd just as soon not be privy to his personal grooming habits). I learned all of these details by tracking his social footprint across the Web -- and he probably has no idea that he has left such a vivid trail behind.

In our age of social sharing, we expect some of our thoughts to be public. But as we slowly put more and more pieces of ourselves online, specialized search engines are making it easier than ever to pull them together into a highly detailed (and potentially invasive) profile of our virtual lives (read "Online Stalking Made Easy").

I'll let you in on a little secret: The picture isn't always pretty. And even if no rap sheet turns up, do you really want the world to know that you look at bad-breath cures online or post awful "Star Trek" fan fiction?

The depths of the Deep Web
You hear a lot of terms bounced around when you talk about this growing breed of search engines. Some services like to be called "social search" utilities, while others prefer the phrase "people search." Many boast of their ability to delve through the "Deep Web" that even Google doesn't touch.

"Even though most people think the size of the Web is basically the Google crawl index, there's actually a lot of information that Google doesn't crawl," says Harrison Tang, founder and CEO of Spokeo -- which, taking a mash-up approach to its identification, describes itself as a "social people search engine" service.

People search engine Spokeo is upfront about what it thinks it can find on anyone.

Spokeo, like its competitors Pipl and CVGadget, is designed to let you dig up information on friends, foes and anyone in between. Spokeo goes a step further than many of the other services, though, by importing your entire e-mail address book.

Then, for a few bucks a month, it continually monitors your contacts and lets you know whenever anyone has done anything new, anywhere online. (The site's home page promises to help you "uncover personal photos, videos and secrets," including "juicy" and "mouth-watering news about friends and co-workers.")


Each individual bit of information may seem insignificant, but the cumulative effect of seeing it assembled in a neatly packaged portfolio is enough to give almost anyone pause.


"Aggregated identity is actually a new type of identity," Tang says, theorizing about why so many people seem to use the word "spooky" when describing his service. "A lot of people know that they have a public MySpace page, a lot of people know that they have a public Twitter album. But, when combined together, it's not one plus one equals two -- you actually create a new identity."


How Spokeo works
Spokeo's system uses your contacts' e-mail addresses to track their activity on a few dozen services, ranging from basic blogs and social networks to a slew of photo- and video-sharing sites. That means the random photos of your kids you shared on Flickr two years ago (or perhaps those less innocent images from your spring-break trip a decade earlier) will pop up right under your name, seconds after someone searches for you.
Less obvious sources such as Amazon Wish Lists, Pandora playlists and movie rating sites fill in the colorful details that you may not have realized were out there at all -- things like (in my lawyer's case) an affinity for New Age jams and nasal maintenance.

I found Mr. Attorney's age on an old MySpace profile and his roller coaster behavior on a personal YouTube video, but Pandora divulged his cravings for Creed and his suggested usages for the "Spa Radio" station he had created. As for the nose-hair trimmer, he can thank his Amazon Wish List for sending that factoid my way.

For sale: Your information

Rapleaf gathers information from the Deep Web -- often posted by you -- and sells it to marketers.

Other services access the same data and then sell the information under the banner of marketing research. One highly visible example is Rapleaf, a company that describes its services as "data and people lookup." Clients pay thousands of dollars to have detailed social profiles of individuals compiled in their own customer databases. As is the case with the data that Spokeo assembles, the information is all publicly available -- Rapleaf just brings it together. "Things that people have posted are out there for anyone to come and see," says Joel Jewitt, Rapleaf's vice president of business development. "As long as you're not going beyond that, that's within the privacy norms today."

Most of Rapleaf's clients, Jewitt says, are simply trying to understand how to use social media more effectively for marketing. An auto manufacturer, for example, might want to know which car models its customers are checking out and discussing on social Internet services. Armed with the company's list of customer e-mail addresses, Rapleaf would crawl the Web and track down the information, person by person.

"It's pretty standard Web spidering," Jewitt says. "We re-create in an automatic way what someone from the general public would be able to do if they were looking."

Electronic exposure

Whether they target businesses or individuals, the services have one thing in common: Unlike the public-record-driven search tools of the past, the new people-tracking utilities build a highly detailed dossier about you solely from information that you yourself published -- a circumstance that may give you a distinct feeling of discomfort.

"What it does is make the ubiquity of the Internet and the sheer openness of the world tangible," says Internet privacy expert Kevin B. McDonald, executive vice president of Alvaka Networks, a network management firm. "It makes the whole concept of the world sharing of information and the 'no-walls' approach that the Internet was designed for very real to people."

The reality can be chilling if the information is going to certain interested individuals: a curious client, a boss big on background checks or an obsessive ex, say. A recent study reported that half of all British Internet users surveyed admitted to having used the Internet to look up information on a former flame. The ease with which someone can arrange to monitor your every electronic move certainly adds a new dimension to the idea of fixation.

"It is a little 'stalkery,'" says Marc Rotenberg, executive director of the Electronic Privacy Information Center. "If the information is distributed, that's actually a form of privacy. When it's gathered up in one place, it creates some new risks."

Rotenberg is no fan of companies that assemble nuggets of personal but public information to turn a profit. "The fact that someone's made something public doesn't mean that someone else can sell it," he contends. "I would say even with affirmative consent, if there's going to be a market for personal data, the user should get some percentage of whatever value the data has."

Taking control
The thing to remember, of course, is that these services aren't doing anything illegal. The information they gather is information that anyone who knew where to look -- and had the time to do it -- could find. So rather than ignoring the king-size file that may have been collected on you, McDonald suggests, you should try to use it as a tool to understand and control your online identity.

"I've come to the point where rather than be driven by the Internet, I intend to drive it to the degree that I can," he says.

"All you can do is learn to live with it," McDonald says. "That's the confines of the world that we live in."


For suggestions on concrete steps you can take to reduce your online exposure, see
"People Search Engines: Slam the Door on What Info They Can Collect."

ORIGINAL

Labels: , , , , , , ,

Investigated by EOPC TEAM @ 11:42 AM
Link To The Evidence| 0 Notes
Wednesday, August 04, 2010
Case# #89 Social Networking Used to Sexually Entice Minors & Adults

Nevada — Law enforcement officials are reminding residents that while social networking sites can be fun, they also present potential dangers in the form of sexual harassment.

Washoe County Sheriffs Office deputies recently arrested Jared Smith, 25, of Sparks, after he allegedly sent messages through a Facebook.com account of a sexual nature to a 14-year-old girl, according to a press release from sheriff's spokesman Armando Avina.

According to the release, the following events transpired on the evening of June 12, 2010:
• WCSO deputies arrived and met with the victim, who showed the officers the illicit content. The adult male logged on as someone else and pretended to be a friend of the female victim. The female victim then identified the alleged suspect to officers.

• The following morning, officers made contact with the male subject accused of sending the female victim messages that were sexual in nature. During the subsequent investigation process, deputies determined the male subject did send the messages.

• Smith was booked into the Washoe County Detention Facility for using technology to lure children, violation of a protection order and stalking – use of the Internet. His bail was set at $18,000.

An underreported crime

Detective Dennis Carry of the Washoe County Internet Crimes Against Children Task Force said incidents where adults use emerging social media websites to entice children are often not reported to the proper authorities.

“It's a huge problem,” Carry said. “Online enticement of children is far underreported. The reports are extremely low in comparison with how many times the crime occurs.”

Carry said open communication lines between parents and children is an important strategy to combat Internet predators.

“Families must communicate about the potential dangers,” he said. “Also, it's critically important the authorities find out when someone is victimized.”

Carry said [people] should not reveal personal information on social media sites such as Facebook, Twitter or MySpace.
original article here

Labels: , , , , , ,

Investigated by yngathrrt @ 2:00 PM
Link To The Evidence| 0 Notes
Tuesday, August 03, 2010
Case# #88 Soldier's Online Dating Con Costs Woman Her Life Savings
An elderly widow has been left seriously out of pocket by an internet dating site scam.

The woman has lost almost all her life savings after being duped into sending hundreds of thousands of pounds to a supposed American soldier.

The trickster befriended the lady on an online chatroom, claiming to be a lieutenant in the US Army stationed in Afghanistan.

And after gaining her trust over a period of months he began to ask to borrow money – saying he could not access his American bank account and that he needed to buy himself out of the army.

Northumbria Police are aware of similar incidents happening all over the country. Enquiries have revealed it to be a scam involving tricksters from the UK, North America and Nigeria.

Northumbria Police is now working with forces across the UK in a bid to trace the scammers. Det Cons Steph Heaney said: “Research carried out during the investigation shows this is quite a well used internet scam with many variations on a similar theme.

“We’re working closely with other forces to find out if they are investigating any similar incidents and we’re doing everything we can to get to the bottom of this – including checking activity on a variety of bank accounts and phone numbers.

“The offenders have taken advantage of a vulnerable woman who trusted the man claiming to be at the other end of the e-mail and believed he was true to his word and would pay her back.

“He promised to take her on holiday and to come and stay with her once he’d left the army.

“It’s disgusting that people could do this to anyone and it’s imperative we do all we can to find the people behind this.

“I’d urge anyone who has fallen victim to a similar scam or knows of anyone who has to get on touch with their local force as they may have vital information.

“And I’d like to raise awareness of this scam to prevent other people from falling victim. The offenders will try to make contact through social and dating websites and it’s imperative that people do not hand over any money to someone they don’t know or have only met online.

“I’d also encourage friends and relatives to make sure they keep an eye on the elderly or vulnerable and listen out for any warning signs so they can make sure they don’t give money to people they don’t know.”

Labels: , , , , , ,

Investigated by yngathrrt @ 11:05 PM
Link To The Evidence| 0 Notes
Monday, July 05, 2010
Case# #77 Managing Your Online Reputation
by Antony Mayfield

The measure of your reputation is what you do plus what others say about you. That was one of the first things I learned in PR. A reputation can be managed, and can be influenced by the things we do, but it can never be designed or decided upon by its holder. Reputation is earned.


As the social web has distributed the power and influence formerly held by the mainstream media, it has created the need for personal reputation awareness. And despite being a long-time user of social media, I found I learned some new things as I navigated these waters for myself. Below are three tips that I found useful.

1. You Are Your Network
I had a call from a BBC researcher asking for background on social networks. The breaking story that day was that personal details and embarrassing photos of the newly appointed head of Britain’s foreign intelligence service, MI6, were splashed all over one newspaper. The source? His family’s Facebook profiles.

It made me think about my own family’s personal details and images. What if I became a story? What would a journalist find? My profile’s privacy settings were locked down, but sure enough, a few clicks showed that my wife’s was wide open.

It was a clear lesson: If you want to manage privacy, reputation, and your security to any extent, you have to think about those around you — especially those who are not as tech-savvy.

2. If You Can’t Delete, Compete
Although it’s a good idea to ask people to remove embarrassing content about you, in the majority of cases the best course is to make sure that you are the first and best source of information about yourself appearing on Google (Google) and other major search engines. “Crowding out,” or pushing that embarrassing party photo down in the search rank can be achieved over time. This approach is best combined with an ethos of developing a thicker skin.

The time may soon come when so much content about our lives is online that we get suspicious if we find no unpolished or slightly embarrassing bits about someone when we look. Why are they so perfect? What are they hiding?

Reputation is a messy and uneven business. Playing the content game is often preferable to an all out war — a battle you will most likely lose.

3. There’s a Cottage Industry Around “Reputation Protection”
In discussing online reputation with friends and colleagues, they predicted that there would be services that offer “the digital equivalent of tattoo removal.” While I didn’t doubt that there would be demand for this kind of thing, I wondered about how it would be realistically implemented.

There is, in fact, a small industry growing up to help people manage how their privacy is affected by the web. At the high end, rich and powerful celebrities now hire digital security specialists to help them lock down everything from their voicemail inbox, to their e-mail and Facebook accounts, and to look for the weak points where stalkers or prying journalists might try to get some juicy information.

For the rest of us, a host of services promise to safeguard your identity and reputation online — I even get one service free with my credit card. It tells me less than my Google Alerts, though, so I’m broadly skeptical about the effectiveness of services like this. At best, they should be combined with an effort to develop personal web literacy and an understanding of how to manage online reputation responsibly.

Conclusion

It is incredibly important that we help our friends, colleagues and families understand the social web. They make up our most valuable social networks. And when you understand networks, you understand that their success and well-being is intrinsically linked to your own.

As Howard Rheingold says, “What you know or don’t know about networks can influence how much freedom, wealth and participation you and your children will have in the rest of this century.”

It should be the goal of every web-savvy professional to have their online reputation precede them.

original article here

Labels: , , , , , , , ,

Investigated by yngathrrt @ 4:00 PM
Link To The Evidence| 0 Notes
Friday, July 02, 2010
Case# 73 Stalking An Old Flame On Facebook? How About Some Federal Charges!
Facebook is not only a site where you can connect with friends and family while taking in a game of FrontierVille, it’s also a complex network that spans the entire world. So what happens when someone stalks you on Facebook, while sending you disturbing messages? In the past the outcome was typically a slap on the wrist, possibly a misdemeanour charge, but that could soon change. The new outcome? Federal Interstate stalking charges if the person that’s stalking you lives in another state.

Law & Order: Criminal Intent star Kathryn Erbe is currently involved in a 2 year stalking case in which deranged fan Charles Nagel not only visited her shooting location in New York, but also harassed her daughter and brother through the popular Facebook service and MySpace. Prosecutors are now determined to have Nagel charged with interstate stalking, a charge that brings with it up to 5-years in prison and a felony count on the guilty person’s record.

While Nagel’s travel to New York city is at the center of the controversy, a guilty verdict with Federal charges attached could give enough precedence for further interstate charges to be filed against Facebook followers who have chosen to stalk their prey online across state lines. The question will become, where is the line drawn between stalking someone from another state in person versus over the internet. Enough news of suicides by harassment and fights caused by text messages have arisen lately that the social impact during the outcome of this case could stem beyond simple misdemeanors charges.

While the case is far from determined, it will be interesting to see how social media plays it’s part in the trial, a guilty verdict in a case dominated by social media mentions could help form social network policing policies for years to come.

What do you think, should Facebook, MySpace and other social networking harassment be tolerated more than traditional stalking or should these crazy online stalkers face harsher penalties as they use modern means to attack their obsessions?

http://www.inquisitr.com/76773/stalking-an-old-flame-on-facebook-how-about-some-federal-charges/

Labels: , , , , , , , ,

Investigated by yngathrrt @ 8:09 AM
Link To The Evidence| 2 Notes
Add to Technorati Favorites
Template courtesy of:
Daria Black

Powered by :
Powered by Blogger