Tuesday, December 28, 2010

Online Reputation and Personal Responsibility

Sites are cropping up all over the internet that promise to protect your reputation online. This started me thinking about online reputation and personal responsibility in the face of an ever shrinking online world.
At what point does our personal responsibility for our own online reputation end?
In this internet age, your reputation is not just everything, it's everywhere.

Logging on to sites like FaceBook and MySpace, we are confronted with the changing face of society. A younger set perfectly content to put every detail of their lives online, without regard to the consequences. What effect does this propensity of information and lowering of boundaries have on the average individual's future? On the average company?
reputation

The answer is that it can adversely effect both individual and company in a variety of ways. Most people who have been online longer than ten minutes know the term "to get dooced" mean to be fired for blogging during/about work. The term was coined for blogger Heather Armstrong, who writes the blog Dooce, and who was one of the first bloggers to find out just how entwined your online reputation is with your offline one. It worked out well for Dooce (her blog is still going strong), but in most cases it works out poorly for he individual.

A company can face even more serious repercussions if its reputation goes in the toilet online. That is why so many companies are adopting strict policies blocking and/or regulating access to the internet at work. One slip by an employee on their personal site, blog or social network profile page can have a company facing serious repercussions for leaked products and other fiascos. That doesn't even begin to touch on how employee conduct may reflect on certain organizations that depend on having a clean reputation to do business.

Add in to the mix the anonymity of the web, which makes people lower their guard even further, and you can have a real mess on your hands. Most people will change their behavior if they think they can get away with it, and the web breeds an erroneous feeling that "no one can see the real you". In face, online, everyone can see the real you. All of the information that has ever been online about you, both private and public, is usually only a few clicks away. That's a sobering thought that most people don't ever pause to consider.

Companies have been cropping up in recent months to handle the new need for online reputation monitoring in the age of hyper connectivity. Some of these companies, like Techrigy, got their start as something else (in the case of Techrigy, a blog backup service is evolving into a reputation protector for companies). Reputation Defender is making a name for itself helping several women lawyers manage their images after they viciously attacked online. Other companies cropping up to help either companies or individuals keep their reputations and identitiy intact include: Stolen ID Search, MyPublicInfo, Claim ID, Naymz, Choice Point, and new uses for old school application LexusNexus.

All of those companies charge steep fee for what amounts to little more than damage control. Once your reputation flounders online, the ensuing ripple effect is often hard to staunch before it becomes a river. For all attacks on individual reputations, a little discretion fro the moment you first log onto a computer and start posting information about yourself would go a long way. Unfortunately, sometimes even the most cautious and circumspect can fall afoul of a vindictive soul (or souls). There are always going to be internet users who see the curtain of anonymity as license to be abusive and libel others, and they are hard to shake once they become fixated on someone.

Companies have their share of zealot opponents too, but they have an easier time dealing with them. By having a response come from the top of the organization immediately upon being faced with a problem, being sincere, and keeping the response as transparent as possible, a company can do much to staunch the hemorrhaging of its reputation due to one incident (the Gizmodo response to the indictment of its action at CES was one example of how not to act when your reputation is challenged online). If a company hasn't been careful with its reputation in the past, or simply puts out a terrible product or service that gets more than just a little bad feedback, they maybe they need to hire an online reputation repair service after all.
google

In my view, personal responsibility goes much further than damage control. Face the fact that unless you have been hyper-vigilant every minute of every day both on and offline, chances are you have something stupid, somewhere, sometime. Even greater are the chance that you or someone else got it on camera, blogged it or otherwise put it out there for the world to see. When that happens, being as forthright as possible about your own actions will go much farther to correct the situation than an online reputation management firm ever could.

In the end, your online reputation is up to you, the individual, and you, the company. Education is key - know where your data is going to be used, and how.
Pay attention to how you present yourself online. Take note of your actions and how they could be construed by others. Behave online as if your mother was looking over your shoulder, instead of as if you were hiding behind a curtain of anonymity, free to be as hurtful as you please. Remember that there are consequences for your actions, even online, though they may not be the ones you expect. If all else fails, face the music with square shoulders and a responsible attitude.


SOURCE

Online Reputation and Personal Responsibility

Sites are cropping up all over the internet that promise to protect your reputation online. This started me thinking about online reputation and personal responsibility in the face of an ever shrinking online world.
At what point does our personal responsibility for our own online reputation end?
In this internet age, your reputation is not just everything, it's everywhere.

Logging on to sites like FaceBook and MySpace, we are confronted with the changing face of society. A younger set perfectly content to put every detail of their lives online, without regard to the consequences. What effect does this propensity of information and lowering of boundaries have on the average individual's future? On the average company?
reputation

The answer is that it can adversely effect both individual and company in a variety of ways. Most people who have been online longer than ten minutes know the term "to get dooced" mean to be fired for blogging during/about work. The term was coined for blogger Heather Armstrong, who writes the blog Dooce, and who was one of the first bloggers to find out just how entwined your online reputation is with your offline one. It worked out well for Dooce (her blog is still going strong), but in most cases it works out poorly for he individual.

A company can face even more serious repercussions if its reputation goes in the toilet online. That is why so many companies are adopting strict policies blocking and/or regulating access to the internet at work. One slip by an employee on their personal site, blog or social network profile page can have a company facing serious repercussions for leaked products and other fiascos. That doesn't even begin to touch on how employee conduct may reflect on certain organizations that depend on having a clean reputation to do business.

Add in to the mix the anonymity of the web, which makes people lower their guard even further, and you can have a real mess on your hands. Most people will change their behavior if they think they can get away with it, and the web breeds an erroneous feeling that "no one can see the real you". In face, online, everyone can see the real you. All of the information that has ever been online about you, both private and public, is usually only a few clicks away. That's a sobering thought that most people don't ever pause to consider.

Companies have been cropping up in recent months to handle the new need for online reputation monitoring in the age of hyper connectivity. Some of these companies, like Techrigy, got their start as something else (in the case of Techrigy, a blog backup service is evolving into a reputation protector for companies). Reputation Defender is making a name for itself helping several women lawyers manage their images after they viciously attacked online. Other companies cropping up to help either companies or individuals keep their reputations and identitiy intact include: Stolen ID Search, MyPublicInfo, Claim ID, Naymz, Choice Point, and new uses for old school application LexusNexus.

All of those companies charge steep fee for what amounts to little more than damage control. Once your reputation flounders online, the ensuing ripple effect is often hard to staunch before it becomes a river. For all attacks on individual reputations, a little discretion fro the moment you first log onto a computer and start posting information about yourself would go a long way. Unfortunately, sometimes even the most cautious and circumspect can fall afoul of a vindictive soul (or souls). There are always going to be internet users who see the curtain of anonymity as license to be abusive and libel others, and they are hard to shake once they become fixated on someone.

Companies have their share of zealot opponents too, but they have an easier time dealing with them. By having a response come from the top of the organization immediately upon being faced with a problem, being sincere, and keeping the response as transparent as possible, a company can do much to staunch the hemorrhaging of its reputation due to one incident (the Gizmodo response to the indictment of its action at CES was one example of how not to act when your reputation is challenged online). If a company hasn't been careful with its reputation in the past, or simply puts out a terrible product or service that gets more than just a little bad feedback, they maybe they need to hire an online reputation repair service after all.
google

In my view, personal responsibility goes much further than damage control. Face the fact that unless you have been hyper-vigilant every minute of every day both on and offline, chances are you have something stupid, somewhere, sometime. Even greater are the chance that you or someone else got it on camera, blogged it or otherwise put it out there for the world to see. When that happens, being as forthright as possible about your own actions will go much farther to correct the situation than an online reputation management firm ever could.

In the end, your online reputation is up to you, the individual, and you, the company. Education is key - know where your data is going to be used, and how.
Pay attention to how you present yourself online. Take note of your actions and how they could be construed by others. Behave online as if your mother was looking over your shoulder, instead of as if you were hiding behind a curtain of anonymity, free to be as hurtful as you please. Remember that there are consequences for your actions, even online, though they may not be the ones you expect. If all else fails, face the music with square shoulders and a responsible attitude.


SOURCE

Monday, December 27, 2010

Felony Computer Misuse for Reading Wife's Email


An Internet law designed to protect the stealing of trade secrets and identities is being used to levy a felony charge against a Michigan man after he logged onto his then-wife's Gmail account and found out she was cheating.

Leon Walker, 33, of Rochester Hills, Mich., is being charged with felony computer misuse, and faces up to five years in prison after logging into the email account of now ex-wife Clara Walker on a shared laptop using her password, the Detroit Free Press reports.

He is facing a Feb. 7 trial. Leon and Clara Walker's divorce was finalized earlier this month, the Free Press reports.

Clara, who was married twice previously, was having an affair with her second husband, as Walker found in her email, according to the Free Press. The second husband had been arrested earlier for beating her in front of her young son from her first husband.

Walker was worried about more domestic violence from husband No. 2, so he handed the e-mails over to the child's father, the Free Press reports. He promptly filed an emergency motion to obtain custody.

Leon Walker, a computer technician with Oakland County, was arrested in February 2009, after Clara Walker learned he had provided the emails to her first husband.

"I was doing what I had to do," Leon Walker told the Free Press in a recent interview. He has been out on bond since shortly after his arrest. "We're talking about putting a child in danger."

Oakland County Prosecutor Jessica Cooper defended her decision to charge Walker, calling him a skilled "hacker" who downloaded the material in "a contentious way."

Electronic Privacy expert Frederick Lane told the Free Press that the case hinges in a legal grey area, and the fact that the laptop was shared may help Walker's cause.

About 45 percent of divorce cases involve some snooping -- and gathering -- of email, Facebook and other online material, Lane said. But he added that those are generally used by the warring parties for civil reasons -- not for criminal prosecution, the Free Press reports.

original article here

Felony Computer Misuse for Reading Wife's Email


An Internet law designed to protect the stealing of trade secrets and identities is being used to levy a felony charge against a Michigan man after he logged onto his then-wife's Gmail account and found out she was cheating.

Leon Walker, 33, of Rochester Hills, Mich., is being charged with felony computer misuse, and faces up to five years in prison after logging into the email account of now ex-wife Clara Walker on a shared laptop using her password, the Detroit Free Press reports.

He is facing a Feb. 7 trial. Leon and Clara Walker's divorce was finalized earlier this month, the Free Press reports.

Clara, who was married twice previously, was having an affair with her second husband, as Walker found in her email, according to the Free Press. The second husband had been arrested earlier for beating her in front of her young son from her first husband.

Walker was worried about more domestic violence from husband No. 2, so he handed the e-mails over to the child's father, the Free Press reports. He promptly filed an emergency motion to obtain custody.

Leon Walker, a computer technician with Oakland County, was arrested in February 2009, after Clara Walker learned he had provided the emails to her first husband.

"I was doing what I had to do," Leon Walker told the Free Press in a recent interview. He has been out on bond since shortly after his arrest. "We're talking about putting a child in danger."

Oakland County Prosecutor Jessica Cooper defended her decision to charge Walker, calling him a skilled "hacker" who downloaded the material in "a contentious way."

Electronic Privacy expert Frederick Lane told the Free Press that the case hinges in a legal grey area, and the fact that the laptop was shared may help Walker's cause.

About 45 percent of divorce cases involve some snooping -- and gathering -- of email, Facebook and other online material, Lane said. But he added that those are generally used by the warring parties for civil reasons -- not for criminal prosecution, the Free Press reports.

original article here

Sunday, December 26, 2010

Man Stalking His Wife Online - Now in Jail


A 27-year-old New York man is facing federal charges he stalked his wife at her parents' Maine home by sending her a series of threatening text messages and comments that were posted on a social networking site.

Jason Fiume of Utica, N.Y., pleaded not guilty Monday to charges that he violated a protection order.

A trial has been set for February 2011.
Court documents say that in June, his estranged wife and her family in Kennebec County began receiving what are described in court documents as "nonstop" phone calls from Fiume. He is also alleged to have sent almost 100 electronic messages.

The Bangor Daily News says that in some of those messages he allegedly threatened to kill his wife.

Fiume is being held without bail.

original article here

Man Stalking His Wife Online - Now in Jail


A 27-year-old New York man is facing federal charges he stalked his wife at her parents' Maine home by sending her a series of threatening text messages and comments that were posted on a social networking site.

Jason Fiume of Utica, N.Y., pleaded not guilty Monday to charges that he violated a protection order.

A trial has been set for February 2011.
Court documents say that in June, his estranged wife and her family in Kennebec County began receiving what are described in court documents as "nonstop" phone calls from Fiume. He is also alleged to have sent almost 100 electronic messages.

The Bangor Daily News says that in some of those messages he allegedly threatened to kill his wife.

Fiume is being held without bail.

original article here

Wednesday, December 22, 2010

Detective Mom Tracks Down Her Rapist - via Facebook


A mother who was almost raped on the way home from a pub turned detective to track down the alleged sex attacker by finding him on Facebook using his unusual name.

Alpha Gray has pleaded not guilty to attempted rape, sexual assault and causing actual bodily harm in the trial at the Old Bailey.

The victim, who cannot be named for legal reasons, picked him out of an identification parade after finding his Facebook profile and reporting him to police.

She told the court she was left with bruises and a bleeding ear after a man tried to rape her shortly after she left a pub in Tufnell Park, north London, in May.

However, the attacker had told her his name was Alpha, that he was 30, and he lived in Holloway, north London, which was all the information she needed to find his profile on the social networking site.

She told the court: 'It's such an unusual name. I didn't think it was his real name. His picture came up and it turned out he knew someone I knew. There was a picture of him on a beach holding a little girl. When the police phoned me, I said from that picture I would not tell if it was him. I was not 100 per cent sure."

But at the identity parade, she picked out Gray, confirming he was the last person she saw.

'When I saw him it drew my breath away,' she said.

Gopal Hooper, prosecuting, told the court that on leaving the pub the woman, who is in her twenties, was approached by a man who pulled down her top and punched her in the face after she tried to run off.

Mr Hooper said: 'Somebody who said his name was Alpha, who was aged 30, who lived in Holloway, attacked this young woman. His defence is his name is Alpha, he is 30, he lives in Holloway and happened to be in the area at the time. He said his name was Alpha. It is a very unusual name, not like Smith or Jones.'

Gray allegedly later told police he was at a friend's birthday party at a club a few minutes away from the pub where the woman had been with friends.

Police discovered his address and he was arrested two days after the attack.

The case continues.

original article here

Detective Mom Tracks Down Her Rapist - via Facebook


A mother who was almost raped on the way home from a pub turned detective to track down the alleged sex attacker by finding him on Facebook using his unusual name.

Alpha Gray has pleaded not guilty to attempted rape, sexual assault and causing actual bodily harm in the trial at the Old Bailey.

The victim, who cannot be named for legal reasons, picked him out of an identification parade after finding his Facebook profile and reporting him to police.

She told the court she was left with bruises and a bleeding ear after a man tried to rape her shortly after she left a pub in Tufnell Park, north London, in May.

However, the attacker had told her his name was Alpha, that he was 30, and he lived in Holloway, north London, which was all the information she needed to find his profile on the social networking site.

She told the court: 'It's such an unusual name. I didn't think it was his real name. His picture came up and it turned out he knew someone I knew. There was a picture of him on a beach holding a little girl. When the police phoned me, I said from that picture I would not tell if it was him. I was not 100 per cent sure."

But at the identity parade, she picked out Gray, confirming he was the last person she saw.

'When I saw him it drew my breath away,' she said.

Gopal Hooper, prosecuting, told the court that on leaving the pub the woman, who is in her twenties, was approached by a man who pulled down her top and punched her in the face after she tried to run off.

Mr Hooper said: 'Somebody who said his name was Alpha, who was aged 30, who lived in Holloway, attacked this young woman. His defence is his name is Alpha, he is 30, he lives in Holloway and happened to be in the area at the time. He said his name was Alpha. It is a very unusual name, not like Smith or Jones.'

Gray allegedly later told police he was at a friend's birthday party at a club a few minutes away from the pub where the woman had been with friends.

Police discovered his address and he was arrested two days after the attack.

The case continues.

original article here

Monday, December 20, 2010

Net Neutrality Vote in U.S. on 12/21/10!


When we log onto the Internet, we take lots of things for granted. We assume that we'll be able to access whatever Web site we want, whenever we want to go there. We assume that we can use any feature we like -- watching online video, listening to podcasts, searching, e-mailing and instant messaging -- anytime we choose. We assume that we can attach devices like wireless routers, game controllers or extra hard drives to make our online experience better.

What makes all these assumptions possible is "Network Neutrality," the guiding principle that preserves the free and open Internet. Net Neutrality means that Internet service providers may not discriminate between different kinds of content and applications online. It guarantees a level playing field for all Web sites and Internet technologies.
But all that could change.

The biggest cable and telephone companies would like to charge money for smooth access to Web sites, speed to run applications, and permission to plug in devices. These network giants believe they should be able to charge Web site operators, application providers and device manufacturers for the right to use the network.
Those who don't make a deal and pay up will experience discrimination: Their sites won't load as quickly, and their applications and devices won't work as well. Without legal protection, consumers could find that a network operator has blocked the Web site of a competitor, or slowed it down so much that it's unusable.

The network owners say they want a "tiered" Internet. If you pay to get in the top tier, your site and your service will run fast. If you don't, you'll be in the slow lane.

What's the Problem Here?
Discrimination: The Internet was designed as an open medium. The fundamental idea since the Internet's inception has been that every Web site, every feature and every service should be treated without discrimination. That's how bloggers can compete with CNN or USA Today for readers. That's how up-and-coming musicians can build underground audiences before they get their first top-40 single. That's why when you use a search engine, you see a list of the sites that are the closest match to your request -- not those that paid the most to reach you. Discrimination endangers our basic Internet freedoms.

Double-dipping: Traditionally, network owners have built a business model by charging consumers for Internet access. Now they want to charge you for access to the network, and then charge you again for the things you do while you're online. They may not charge you directly via pay-per-view Web sites. But they will charge all the service providers you use. These providers will then pass those costs along to you in the form of price hikes or new charges to view content.

Stifling innovation: Net Neutrality ensures that innovators can start small and dream big about being the next EBay or Google without facing insurmountable hurdles. Unless we preserve Net Neutrality, startups and entrepreneurs will be muscled out of the marketplace by big corporations that pay for a top spot on the Web. On a tiered Internet controlled by the phone and cable companies, only their own content and services -- or those offered by corporate partners that pony up enough "protection money" -- will enjoy life in the fast lane.

The End of the Internet?
Make no mistake: The free-flowing Internet as we know it could very well become history.

What does that mean? It means we could be headed toward a pay-per-view Internet where Web sites have fees. It means we may have to pay a network tax to run voice-over-the-Internet phones, use an advanced search engine, or chat via Instant Messenger. The next generation of inventions will be shut out of the top-tier service level. Meanwhile, the network owners will rake in even greater profits.

READ MORE HERE: http://www.savetheinternet.com/net-neutrality-101

Net Neutrality Vote in U.S. on 12/21/10!


When we log onto the Internet, we take lots of things for granted. We assume that we'll be able to access whatever Web site we want, whenever we want to go there. We assume that we can use any feature we like -- watching online video, listening to podcasts, searching, e-mailing and instant messaging -- anytime we choose. We assume that we can attach devices like wireless routers, game controllers or extra hard drives to make our online experience better.

What makes all these assumptions possible is "Network Neutrality," the guiding principle that preserves the free and open Internet. Net Neutrality means that Internet service providers may not discriminate between different kinds of content and applications online. It guarantees a level playing field for all Web sites and Internet technologies.
But all that could change.

The biggest cable and telephone companies would like to charge money for smooth access to Web sites, speed to run applications, and permission to plug in devices. These network giants believe they should be able to charge Web site operators, application providers and device manufacturers for the right to use the network.
Those who don't make a deal and pay up will experience discrimination: Their sites won't load as quickly, and their applications and devices won't work as well. Without legal protection, consumers could find that a network operator has blocked the Web site of a competitor, or slowed it down so much that it's unusable.

The network owners say they want a "tiered" Internet. If you pay to get in the top tier, your site and your service will run fast. If you don't, you'll be in the slow lane.

What's the Problem Here?
Discrimination: The Internet was designed as an open medium. The fundamental idea since the Internet's inception has been that every Web site, every feature and every service should be treated without discrimination. That's how bloggers can compete with CNN or USA Today for readers. That's how up-and-coming musicians can build underground audiences before they get their first top-40 single. That's why when you use a search engine, you see a list of the sites that are the closest match to your request -- not those that paid the most to reach you. Discrimination endangers our basic Internet freedoms.

Double-dipping: Traditionally, network owners have built a business model by charging consumers for Internet access. Now they want to charge you for access to the network, and then charge you again for the things you do while you're online. They may not charge you directly via pay-per-view Web sites. But they will charge all the service providers you use. These providers will then pass those costs along to you in the form of price hikes or new charges to view content.

Stifling innovation: Net Neutrality ensures that innovators can start small and dream big about being the next EBay or Google without facing insurmountable hurdles. Unless we preserve Net Neutrality, startups and entrepreneurs will be muscled out of the marketplace by big corporations that pay for a top spot on the Web. On a tiered Internet controlled by the phone and cable companies, only their own content and services -- or those offered by corporate partners that pony up enough "protection money" -- will enjoy life in the fast lane.

The End of the Internet?
Make no mistake: The free-flowing Internet as we know it could very well become history.

What does that mean? It means we could be headed toward a pay-per-view Internet where Web sites have fees. It means we may have to pay a network tax to run voice-over-the-Internet phones, use an advanced search engine, or chat via Instant Messenger. The next generation of inventions will be shut out of the top-tier service level. Meanwhile, the network owners will rake in even greater profits.

READ MORE HERE: http://www.savetheinternet.com/net-neutrality-101

Sunday, December 19, 2010

DON'T TAKE GOOGLE FOR GRANTED!

Instead of taking Google for granted, we need to remember that criminals get the same easy access to information we get from a capable and quick search engine.

To see what the Internet knows about you, start by going to the Google site or by using the Google toolbar. Next, either type your name in quotations or, for a more refined search, type intext: (intext with a colon) immediately followed by your name in quotes. Now type your address or phone number, and Google may turn up a church or a social group directory listing. If this doesn't surprise or outrage you, type into Google your social security number or credit card numbers.
(You can also use metasearches such as Mamma.com, Dogpile.com or others)

So never put anything personal, such as your social security number on a resume, on the Internet, not even temporarily. Be careful about using the same nickname over and over - especially if you have posts on sites you'd prefer others don't see. Sites like Archive.org can have incriminating posts of yours cached for years.

And if you find such information on a cached Web page - find out how to get it removed and do so, if possible. (google cache can be PERMANENT)


ORIGINAL POST

DON'T TAKE GOOGLE FOR GRANTED!

Instead of taking Google for granted, we need to remember that criminals get the same easy access to information we get from a capable and quick search engine.

To see what the Internet knows about you, start by going to the Google site or by using the Google toolbar. Next, either type your name in quotations or, for a more refined search, type intext: (intext with a colon) immediately followed by your name in quotes. Now type your address or phone number, and Google may turn up a church or a social group directory listing. If this doesn't surprise or outrage you, type into Google your social security number or credit card numbers.
(You can also use metasearches such as Mamma.com, Dogpile.com or others)

So never put anything personal, such as your social security number on a resume, on the Internet, not even temporarily. Be careful about using the same nickname over and over - especially if you have posts on sites you'd prefer others don't see. Sites like Archive.org can have incriminating posts of yours cached for years.

And if you find such information on a cached Web page - find out how to get it removed and do so, if possible. (google cache can be PERMANENT)


ORIGINAL POST

Wednesday, December 15, 2010

Threats + Nude Photo on the Net = Arrest


(Texas) David Keith Clark may have said and done too much. At least, that's what an arrest warrant alleges about the San Antonio man. According to San Antonio police, he attacked a woman he used to live with, threatened her through text messages, and posted a nude photograph of her on the Internet.

The 32-year-old has been arrested on assault and telephone harassment charges. He remains in the Bexar County Detention Center trying to make bonds that total nearly $20,000.

Police said the initial physical attack happened on Nov. 13 in the 9200 block of Ridge Branch. The warrant said he strangled a woman he used to be romantically involved with until she could not breathe. The victim reportedly managed to free herself and scream for help. Investigators said Clark ran from the scene.

Another arrest warrant said the suspect started sending the victim threatening and harassing text messages following the attack. The victim claims the texts were even being posted on a computer website.

The arrest document describes the texts as derogatory and repeatedly threatening. In fact, the suspect even said he'd be waiting in bushes to jump out and slash the victim's throat police said.

Investigators said Clark went so far as to post a topless picture on the Internet of his ex. Then, police said he attached a berating phrase to the picture.

The victim filed a complaint with SAPD. Clark was arrested.

original article here

Threats + Nude Photo on the Net = Arrest


(Texas) David Keith Clark may have said and done too much. At least, that's what an arrest warrant alleges about the San Antonio man. According to San Antonio police, he attacked a woman he used to live with, threatened her through text messages, and posted a nude photograph of her on the Internet.

The 32-year-old has been arrested on assault and telephone harassment charges. He remains in the Bexar County Detention Center trying to make bonds that total nearly $20,000.

Police said the initial physical attack happened on Nov. 13 in the 9200 block of Ridge Branch. The warrant said he strangled a woman he used to be romantically involved with until she could not breathe. The victim reportedly managed to free herself and scream for help. Investigators said Clark ran from the scene.

Another arrest warrant said the suspect started sending the victim threatening and harassing text messages following the attack. The victim claims the texts were even being posted on a computer website.

The arrest document describes the texts as derogatory and repeatedly threatening. In fact, the suspect even said he'd be waiting in bushes to jump out and slash the victim's throat police said.

Investigators said Clark went so far as to post a topless picture on the Internet of his ex. Then, police said he attached a berating phrase to the picture.

The victim filed a complaint with SAPD. Clark was arrested.

original article here

Tuesday, December 14, 2010

Free Speech Is On the Side of Web Postings

Free Speech Online
Bid To Out Bloggers Dropped

Jennifer Friedlin - Jewish Week Correspondent
(excerpts.... link to full article at the bottom of this post)

A group of anonymous bloggers that had published information on their Web sites about a disgraced Rockland County rabbi's alleged sexual misconduct won a victory when the rabbi withdrew one of two petitions to subpoena their identities.

Rabbi Mordecai Tendler, the former leader of Kehillat New Hempstead in New Hempstead, N.Y., who has been accused of sexual harassment by former congregants, filed petitions both in Ohio and California district courts in an effort to force Google, the Internet giant that hosts the bloggers' websites, to disclose their identities.

The bloggers' attorney, Paul Alan Levy of Public Citizen, a Washington-based public interest organization, said Rabbi Tendler’s decision to withdraw the petition represented a victory for the First Amendment right to free speech. He also said that the decision reflected Rabbi Tendler's inability to prove that the bloggers had defamed him.
"If he had had evidence of falsity and malice he could have gone forward against these folks," said Levy, noting that as soon as the bloggers filed their motion claiming that Rabbi Tendler's petition would violate their right to free speech, he withdrew his demand.

Levy said the bloggers were moving ahead with a motion under state law that protects against so-called strategic lawsuits against public participation and would seek to have Rabbi Tendler required to cover the bloggers' legal fees.


Although the U.S. Supreme Court has yet to set a federal standard regarding what a defamation plaintiff would have to show before an anonymous blogger could be unmasked, lower court decisions have so far set a high bar, demanding that plaintiffs clearly establish that the claims made against them are false before the online accuser can be outed.

"It's a pretty high standard," said David Hudson, research attorney for the First Amendment Center, an educational organization based in Nashville, Tenn., and Arlington, Va.

While undermining their own credibility, anonymous bloggers may in fact be protecting themselves legally. Robert Cox, president of the Media Bloggers Association, an organization of bloggers, said that one of the standards used in defamation cases is whether a reasonable person would believe a particular statement was true. However, given that blogs are held in lower esteem than many newspapers and magazines, such a standard may not be met in a defamation case against a blogger, particularly an anonymous one.

Cox said that although this issue has yet to be settled in court, bloggers might prove immune to claims of defamation "because nobody believes us."

Widely believed or not, some anonymous bloggers say they are in fact having a great deal of impact and that they plan to continue blogging anonymously.

UOJ says that before he posts any claims against anyone he conducts his own investigation, verifying the allegations with five sources. Once he's satisfied that he has met his own standard, he posts the claims.

(EOPC also investigates to our own standard and anyone who sends us information on their cyberpath must sign a release taking FULL responsibility for the 100% truthfulness of what is told to us & posted.

It is not illegal, nor is it harassment to post the TRUTH about a predatory individual who takes advantage of others via the internet or other means... no matter what these Cyberpaths wish, want or threaten to do.)


"'Free speech' permits me to say 'anything' I feel is accurate," UOJ wrote in an e-mail.

For now, no one is challenging him.

EXCERPTS FROM THIS ARTICLE (CLICK HERE)


GOOD INFORMATION ON SAFE BLOGGING

Free Speech Is On the Side of Web Postings

Free Speech Online
Bid To Out Bloggers Dropped

Jennifer Friedlin - Jewish Week Correspondent
(excerpts.... link to full article at the bottom of this post)

A group of anonymous bloggers that had published information on their Web sites about a disgraced Rockland County rabbi's alleged sexual misconduct won a victory when the rabbi withdrew one of two petitions to subpoena their identities.

Rabbi Mordecai Tendler, the former leader of Kehillat New Hempstead in New Hempstead, N.Y., who has been accused of sexual harassment by former congregants, filed petitions both in Ohio and California district courts in an effort to force Google, the Internet giant that hosts the bloggers' websites, to disclose their identities.

The bloggers' attorney, Paul Alan Levy of Public Citizen, a Washington-based public interest organization, said Rabbi Tendler’s decision to withdraw the petition represented a victory for the First Amendment right to free speech. He also said that the decision reflected Rabbi Tendler's inability to prove that the bloggers had defamed him.
"If he had had evidence of falsity and malice he could have gone forward against these folks," said Levy, noting that as soon as the bloggers filed their motion claiming that Rabbi Tendler's petition would violate their right to free speech, he withdrew his demand.

Levy said the bloggers were moving ahead with a motion under state law that protects against so-called strategic lawsuits against public participation and would seek to have Rabbi Tendler required to cover the bloggers' legal fees.


Although the U.S. Supreme Court has yet to set a federal standard regarding what a defamation plaintiff would have to show before an anonymous blogger could be unmasked, lower court decisions have so far set a high bar, demanding that plaintiffs clearly establish that the claims made against them are false before the online accuser can be outed.

"It's a pretty high standard," said David Hudson, research attorney for the First Amendment Center, an educational organization based in Nashville, Tenn., and Arlington, Va.

While undermining their own credibility, anonymous bloggers may in fact be protecting themselves legally. Robert Cox, president of the Media Bloggers Association, an organization of bloggers, said that one of the standards used in defamation cases is whether a reasonable person would believe a particular statement was true. However, given that blogs are held in lower esteem than many newspapers and magazines, such a standard may not be met in a defamation case against a blogger, particularly an anonymous one.

Cox said that although this issue has yet to be settled in court, bloggers might prove immune to claims of defamation "because nobody believes us."

Widely believed or not, some anonymous bloggers say they are in fact having a great deal of impact and that they plan to continue blogging anonymously.

UOJ says that before he posts any claims against anyone he conducts his own investigation, verifying the allegations with five sources. Once he's satisfied that he has met his own standard, he posts the claims.

(EOPC also investigates to our own standard and anyone who sends us information on their cyberpath must sign a release taking FULL responsibility for the 100% truthfulness of what is told to us & posted.

It is not illegal, nor is it harassment to post the TRUTH about a predatory individual who takes advantage of others via the internet or other means... no matter what these Cyberpaths wish, want or threaten to do.)


"'Free speech' permits me to say 'anything' I feel is accurate," UOJ wrote in an e-mail.

For now, no one is challenging him.

EXCERPTS FROM THIS ARTICLE (CLICK HERE)


GOOD INFORMATION ON SAFE BLOGGING

Sunday, December 12, 2010

More Head Games with Beatrice Acevedo


Comments in Dark Blue are EOPC's opinions

FROM: Beatrice Acevedo
September 1, 2008 at 4:05pm

Ohh sweetheart, my love, my baby. I am so thankful to God we met. I wanna be your little Belgian wife and make you happy for the rest of your life and I wanna make a beautiful little bambino with you.., or a bambina!

The victim reports that soon after the above her pattern seemed different. family, friends thought i was getting taken for a ride. I was ready to break, but noooooooo -- she hoover manuevers him back in with lame reassurances.
Beatrice Acevedo
September 18, 2008 at 10:39am

Hi Honey,
Thanks for the wakeup call this morning. I heard the phone but could not hear your voice. kept being disconnected. What a bummer! I am glad we talked yesterday.Love hearing your voice. I don't know what has happened to us lately. Maybe it's because we have not been together yet and are getting impatient. It is not a good thing though not to trust each other, especially since we have only being calling, talking on FB and texted. We haven't touched, kissed or been physically involved but still we care alot about each other and much more. I don't want us to feel this way again. We have been so close and fought together (Tony, the immigration, obstacles of all kind). I hope this time we can make it, amore.
Ti amo molto. Bacci per te. Honey

The victim booked a flight for a 2 week visit to see Acevedo and gave her plenty of notice. Just DAYS before he gets this:

Beatrice Acevedo
September 22, 2008 at 4:19pm

My dear Davey, sweetheart,

I hope you're not gonna get upset at me for wht I am about to tell you. I know it is at the last minute but I feel I have no choice. I talked to the ADD this morning, explained the situation and ask her for advice as to how you should handle tony if a problem should arise. I di not expect that kind of answer or reaction from her. She told me that it almost seems like we used the fact that he hit me once on the lip as an excuse for us to get him out of the house and that therefore when he goes to Court on October 17th he could actually use that against us, actually against me. That could possibly cause me some trouble.

The worst case scenario, due to the situation and the Squatter"s law if they rule in his favor he might be allowed to use my place as his residence til he finds something else and I would loose my order of protection. I know it sounds wack but that is unfortunately the reality. I am sure you are as upset and disappointed as I am but I am asking you to be patient and follow the ADD's advice to wait til after the trail for a visit. It would actually be better if I go up there because he would have no proof of my destination. My cell is fixed so please give me a call later so we can talk about this. I ams o sorry baby. Ti amo molto e sempre. Bacci, besos.
Honey Bea



FROM: Beatrice Acevedo
August 7, 2008 at 8:39am

Bonjour mon chou,
I just got the opportunity to open Facebook and read your message.I know you would be blinded by desire, that's why I did it. I am such a naughty girl, hehe....

Pauvre singe, il travaille overtime et ce n'est rien en comparaison du"overtime" qu'il va faire quand tu arrives a New York. Yeah, I want us to do it nice and slow! I want us to take our time.
Many kisses to you too, everywhere.
Je t'aime, mon amour.

Your message makes me feel better because I had to deal with T** again this morning. He bothered me at home then he won't stop calling my job to start arguing. I told him that if he does not stop that I will go to Court. I told him he has to leave soon because it's over and I will never change my mind. He then called me selfish! If somebody has been selfish throughout the years it's him. I can't wait for you to come down here, Baby. I need you so much by my side. Whether he wants it or not he must leave. He has to accept that our love is meant to last and what we mean to each other. You are truly the man I was waiting for all those years. I love you sooo much.
Can't wait to hear your voice tonight!!
Bacci, bacci.
Your Honey Bea forever.


Beatrice Acevedo
August 19, 2008 at 3:41pm

Ti amo, Je t'aime, te quiero, ish liebe disch, ik hou van jou....
We will be together for our B'days the latest!
Let's talk about all this tonight and make plans. When there is a will there is a way! Love will find a way.
Your Honey Bea forever.


Beatrice Acevedo
August 25, 2008 at 9:28am

Bonjour mon cheri,
Now that I have a few minutes of privacy, let em tell you how I am gonna take care of you. First I will "try" to undress you slowly... if I am too impatient I am gonna have to rip your clothes off!!

I am going to kiss you slowly, then more and more passionately. I love French kissing and I am pretty good at it so I will *********. I find it very exciting for both of us!

*********

Now I think you are like a volacno about to erupt!!!
I hope you enjoyed reading my sex message :)
Til we meet in a month maybe we could do phone and text sex!!! What do you think? Would you enjoy that?
I love you with all my heart baby. I enjoyed hearing your sexy voice this morning telling me in details how you're gonna ****.
You are my true love Darling.
Can't wait to see you, be with you and ******.
Bacci, bisous.
Honey Bea



Beatrice Acevedo
August 29, 2008 at 3:09pm

Can't wait to hear your sexy husky male voice tonight. You rule my world Baby!
By the way, I saw T** this morning and he said he does not think you are right for me and that there is something wrong with you. I said that of course he has to say that since he is jealous. He would say that just about any man!! He also said he is worried for me and the kids. Look who's talking...he has got balls to talk this way after what happened!



Pathological liar? Yes... EOPC thinks so. And the mind f**k is unreal.

More Head Games with Beatrice Acevedo


Comments in Dark Blue are EOPC's opinions

FROM: Beatrice Acevedo
September 1, 2008 at 4:05pm

Ohh sweetheart, my love, my baby. I am so thankful to God we met. I wanna be your little Belgian wife and make you happy for the rest of your life and I wanna make a beautiful little bambino with you.., or a bambina!

The victim reports that soon after the above her pattern seemed different. family, friends thought i was getting taken for a ride. I was ready to break, but noooooooo -- she hoover manuevers him back in with lame reassurances.
Beatrice Acevedo
September 18, 2008 at 10:39am

Hi Honey,
Thanks for the wakeup call this morning. I heard the phone but could not hear your voice. kept being disconnected. What a bummer! I am glad we talked yesterday.Love hearing your voice. I don't know what has happened to us lately. Maybe it's because we have not been together yet and are getting impatient. It is not a good thing though not to trust each other, especially since we have only being calling, talking on FB and texted. We haven't touched, kissed or been physically involved but still we care alot about each other and much more. I don't want us to feel this way again. We have been so close and fought together (Tony, the immigration, obstacles of all kind). I hope this time we can make it, amore.
Ti amo molto. Bacci per te. Honey

The victim booked a flight for a 2 week visit to see Acevedo and gave her plenty of notice. Just DAYS before he gets this:

Beatrice Acevedo
September 22, 2008 at 4:19pm

My dear Davey, sweetheart,

I hope you're not gonna get upset at me for wht I am about to tell you. I know it is at the last minute but I feel I have no choice. I talked to the ADD this morning, explained the situation and ask her for advice as to how you should handle tony if a problem should arise. I di not expect that kind of answer or reaction from her. She told me that it almost seems like we used the fact that he hit me once on the lip as an excuse for us to get him out of the house and that therefore when he goes to Court on October 17th he could actually use that against us, actually against me. That could possibly cause me some trouble.

The worst case scenario, due to the situation and the Squatter"s law if they rule in his favor he might be allowed to use my place as his residence til he finds something else and I would loose my order of protection. I know it sounds wack but that is unfortunately the reality. I am sure you are as upset and disappointed as I am but I am asking you to be patient and follow the ADD's advice to wait til after the trail for a visit. It would actually be better if I go up there because he would have no proof of my destination. My cell is fixed so please give me a call later so we can talk about this. I ams o sorry baby. Ti amo molto e sempre. Bacci, besos.
Honey Bea



FROM: Beatrice Acevedo
August 7, 2008 at 8:39am

Bonjour mon chou,
I just got the opportunity to open Facebook and read your message.I know you would be blinded by desire, that's why I did it. I am such a naughty girl, hehe....

Pauvre singe, il travaille overtime et ce n'est rien en comparaison du"overtime" qu'il va faire quand tu arrives a New York. Yeah, I want us to do it nice and slow! I want us to take our time.
Many kisses to you too, everywhere.
Je t'aime, mon amour.

Your message makes me feel better because I had to deal with T** again this morning. He bothered me at home then he won't stop calling my job to start arguing. I told him that if he does not stop that I will go to Court. I told him he has to leave soon because it's over and I will never change my mind. He then called me selfish! If somebody has been selfish throughout the years it's him. I can't wait for you to come down here, Baby. I need you so much by my side. Whether he wants it or not he must leave. He has to accept that our love is meant to last and what we mean to each other. You are truly the man I was waiting for all those years. I love you sooo much.
Can't wait to hear your voice tonight!!
Bacci, bacci.
Your Honey Bea forever.


Beatrice Acevedo
August 19, 2008 at 3:41pm

Ti amo, Je t'aime, te quiero, ish liebe disch, ik hou van jou....
We will be together for our B'days the latest!
Let's talk about all this tonight and make plans. When there is a will there is a way! Love will find a way.
Your Honey Bea forever.


Beatrice Acevedo
August 25, 2008 at 9:28am

Bonjour mon cheri,
Now that I have a few minutes of privacy, let em tell you how I am gonna take care of you. First I will "try" to undress you slowly... if I am too impatient I am gonna have to rip your clothes off!!

I am going to kiss you slowly, then more and more passionately. I love French kissing and I am pretty good at it so I will *********. I find it very exciting for both of us!

*********

Now I think you are like a volacno about to erupt!!!
I hope you enjoyed reading my sex message :)
Til we meet in a month maybe we could do phone and text sex!!! What do you think? Would you enjoy that?
I love you with all my heart baby. I enjoyed hearing your sexy voice this morning telling me in details how you're gonna ****.
You are my true love Darling.
Can't wait to see you, be with you and ******.
Bacci, bisous.
Honey Bea



Beatrice Acevedo
August 29, 2008 at 3:09pm

Can't wait to hear your sexy husky male voice tonight. You rule my world Baby!
By the way, I saw T** this morning and he said he does not think you are right for me and that there is something wrong with you. I said that of course he has to say that since he is jealous. He would say that just about any man!! He also said he is worried for me and the kids. Look who's talking...he has got balls to talk this way after what happened!



Pathological liar? Yes... EOPC thinks so. And the mind f**k is unreal.

Wednesday, December 8, 2010

Browser Flaw Can Pick Up Your Porn Site Visits

Dozens of websites have been secretly harvesting lists of places that their users previously visited online, everything from news articles to bank sites to pornography, a team of computer scientists found.

The information is valuable for con artists to learn more about their targets and send them personalized attacks. It also allows e-commerce companies to adjust ads or prices — for instance, if the site knows you've just come from a competitor that is offering a lower price.

Although passwords aren't at risk, in harvesting a detailed list of where you've been online, sites can create thorough profiles on its users.

The technique the University of California, San Diego researchers investigated is called "history sniffing" and is a result of the way browsers interact with websites and record where they've been. A few lines of programming code are all a site needs to pull it off.

Although security experts have known for nearly a decade that such snooping is possible, the latest findings offer some of the first public evidence of sites exploiting the problem. Current versions of the Firefox and Internet Explorer browsers still allow this, as do older versions of Chrome and Safari, the researchers said.

The report adds to growing worry about surreptitious surveillance by Internet companies and comes as federal regulators in the U.S. are proposing a "Do Not Track" tool that would prevent advertisers from following consumers around online to sell them more products.

The researchers found 46 sites, ranging from smutty to staid, that tried to pry loose their visitors browsing histories using this technique, sometimes with homegrown tracking code. Nearly half of the 46 sites, including financial research site Morningstar.com and news site Newsmax.com, used an ad-targeting company, Interclick, which says its code was responsible for the tracking.

Interclick said the tracking was part of an eight-month experiment that the sites weren't aware of. The New York company said it stopped using the technique in October because it wasn't successful in helping match advertisers to groups of Internet users. Interclick emphasized that it didn't store the browser histories.

Morningstar said it ended its relationship with Interclick when it found out about the program, and NewsMax said it didn't know that history sniffing had been used on its users until AP called. NewsMax said it is investigating.

The researchers studied far more sites — a total of the world's 50,000 most popular sites — and said many more behaved suspiciously, but couldn't be proven to use history sniffing. Nearly 500 of the sites studied had characteristics that suggested they could infer browsers' histories, and more than 60 transferred browser histories to the network. But the researchers said they could only prove that 46 had done actual "history hijacking."

"Browser vendors should have fixed this a long time ago," said Jeremiah Grossman, an Internet security expert at WhiteHat Security Inc., which wasn't involved in the study. "It's more evidence that we not only needed the fix, but that people really should upgrade their browsers. Most people wouldn't know this is possible."

The latest versions of Google Inc.'s Chrome and Apple Inc.'s Safari have automatic protections for this kind of snooping, researchers said. Mozilla Corp. said the next version of Firefox will have the same feature, adding that a workaround exists for some older versions as well.

Microsoft Corp. noted that Internet Explorer users can enable a private browsing mode that prevents the browser from logging the user's history, which prevents this kind of spying. But private browsing also strips away important benefits of the browser knowing its own history, such as displaying Google links you've visited in different colors than those you haven't.

"It's surprising, the lifetime that this fundamental a privacy violation can stick around," said Hovav Shacham, an assistant professor of computer science and engineering at UC San Diego and one of the paper's authors.

Internet companies are obsessed with tracking users' behavior so they can target their ads better. Uproar has prompted the Federal Trade Commission to propose rules that would limit advertisers' ability to track Internet users to show them advertisements. The "Do Not Track" tool the commission is proposing could eventually take the form of a browser setting that tells advertisers which visitors are off limits; such a setting, though, wouldn't necessarily block history sniffing.

History sniffing is essentially a side-by-side comparison of Web pages you've already visited with Web pages that a particular site wants to see if you've visited. If there's a match, users likely would never know, but the site administrators would learn a lot about their audiences.

For instance, a popular porn site was checking its visitors' histories to see if they'd visited 23 other pornography sites, and the code used on the Morningstar and NewsMax.com sites looked for matches against 48 specific Web pages, all related to Ford automobiles.

Sites can carry on this kind of inspection very quickly. Grossman said modern programs can check as many as 20,000 Internet addresses per second.

Browser Flaw Can Pick Up Your Porn Site Visits

Dozens of websites have been secretly harvesting lists of places that their users previously visited online, everything from news articles to bank sites to pornography, a team of computer scientists found.

The information is valuable for con artists to learn more about their targets and send them personalized attacks. It also allows e-commerce companies to adjust ads or prices — for instance, if the site knows you've just come from a competitor that is offering a lower price.

Although passwords aren't at risk, in harvesting a detailed list of where you've been online, sites can create thorough profiles on its users.

The technique the University of California, San Diego researchers investigated is called "history sniffing" and is a result of the way browsers interact with websites and record where they've been. A few lines of programming code are all a site needs to pull it off.

Although security experts have known for nearly a decade that such snooping is possible, the latest findings offer some of the first public evidence of sites exploiting the problem. Current versions of the Firefox and Internet Explorer browsers still allow this, as do older versions of Chrome and Safari, the researchers said.

The report adds to growing worry about surreptitious surveillance by Internet companies and comes as federal regulators in the U.S. are proposing a "Do Not Track" tool that would prevent advertisers from following consumers around online to sell them more products.

The researchers found 46 sites, ranging from smutty to staid, that tried to pry loose their visitors browsing histories using this technique, sometimes with homegrown tracking code. Nearly half of the 46 sites, including financial research site Morningstar.com and news site Newsmax.com, used an ad-targeting company, Interclick, which says its code was responsible for the tracking.

Interclick said the tracking was part of an eight-month experiment that the sites weren't aware of. The New York company said it stopped using the technique in October because it wasn't successful in helping match advertisers to groups of Internet users. Interclick emphasized that it didn't store the browser histories.

Morningstar said it ended its relationship with Interclick when it found out about the program, and NewsMax said it didn't know that history sniffing had been used on its users until AP called. NewsMax said it is investigating.

The researchers studied far more sites — a total of the world's 50,000 most popular sites — and said many more behaved suspiciously, but couldn't be proven to use history sniffing. Nearly 500 of the sites studied had characteristics that suggested they could infer browsers' histories, and more than 60 transferred browser histories to the network. But the researchers said they could only prove that 46 had done actual "history hijacking."

"Browser vendors should have fixed this a long time ago," said Jeremiah Grossman, an Internet security expert at WhiteHat Security Inc., which wasn't involved in the study. "It's more evidence that we not only needed the fix, but that people really should upgrade their browsers. Most people wouldn't know this is possible."

The latest versions of Google Inc.'s Chrome and Apple Inc.'s Safari have automatic protections for this kind of snooping, researchers said. Mozilla Corp. said the next version of Firefox will have the same feature, adding that a workaround exists for some older versions as well.

Microsoft Corp. noted that Internet Explorer users can enable a private browsing mode that prevents the browser from logging the user's history, which prevents this kind of spying. But private browsing also strips away important benefits of the browser knowing its own history, such as displaying Google links you've visited in different colors than those you haven't.

"It's surprising, the lifetime that this fundamental a privacy violation can stick around," said Hovav Shacham, an assistant professor of computer science and engineering at UC San Diego and one of the paper's authors.

Internet companies are obsessed with tracking users' behavior so they can target their ads better. Uproar has prompted the Federal Trade Commission to propose rules that would limit advertisers' ability to track Internet users to show them advertisements. The "Do Not Track" tool the commission is proposing could eventually take the form of a browser setting that tells advertisers which visitors are off limits; such a setting, though, wouldn't necessarily block history sniffing.

History sniffing is essentially a side-by-side comparison of Web pages you've already visited with Web pages that a particular site wants to see if you've visited. If there's a match, users likely would never know, but the site administrators would learn a lot about their audiences.

For instance, a popular porn site was checking its visitors' histories to see if they'd visited 23 other pornography sites, and the code used on the Morningstar and NewsMax.com sites looked for matches against 48 specific Web pages, all related to Ford automobiles.

Sites can carry on this kind of inspection very quickly. Grossman said modern programs can check as many as 20,000 Internet addresses per second.

Tuesday, December 7, 2010

Charged with Assault AND Facebook Stalking!


A woman who accused her ex-boyfriend of assaulting her, also told the Corporate Area Resident Magistrate's Court yesterday that he was also stalking her on Facebook.

The accused pleaded not guilty to assault and also denied the cyber-stalking allegations.

The allegations are that the two, who were once in a relationship, had an argument after the complainant disconnected the accused man's cellular service, which was in her name. She alleged that during a confrontation, the accused hit her.

She also told the court that the accused was sending her constant text messages and emails and had also created several fictitious Facebook accounts, which he used to send her 'friend requests'.

The accused, however, said the complainant was upset because he decided to end the relationship, and had even warned him that he would pay for "messing with a vindictive bitch." He said he did not create the Facebook accounts and suggested that the complainant was the type who would let her friends do it just to get him in trouble.

Resident Magistrate Judith Pusey had harsh words for both parties. She warned the complainant against using her emotions and plotting revenge and also told the accused to leave her alone, both in reality and virtually.


original article here

Charged with Assault AND Facebook Stalking!


A woman who accused her ex-boyfriend of assaulting her, also told the Corporate Area Resident Magistrate's Court yesterday that he was also stalking her on Facebook.

The accused pleaded not guilty to assault and also denied the cyber-stalking allegations.

The allegations are that the two, who were once in a relationship, had an argument after the complainant disconnected the accused man's cellular service, which was in her name. She alleged that during a confrontation, the accused hit her.

She also told the court that the accused was sending her constant text messages and emails and had also created several fictitious Facebook accounts, which he used to send her 'friend requests'.

The accused, however, said the complainant was upset because he decided to end the relationship, and had even warned him that he would pay for "messing with a vindictive bitch." He said he did not create the Facebook accounts and suggested that the complainant was the type who would let her friends do it just to get him in trouble.

Resident Magistrate Judith Pusey had harsh words for both parties. She warned the complainant against using her emotions and plotting revenge and also told the accused to leave her alone, both in reality and virtually.


original article here

Saturday, December 4, 2010

Adults Responsible for Internet Abuse, Too

Almost all of our cyberpaths bully and torment their victims when they find out they have been busted & exposed. Victims who are already physically and emotional sick with PTSD and trauma. However, shaming the only justice they will recieve until laws change. Vigilantes? We think not. - EOPC
loserville
Cyberbullying isn't just a problem among adolescents. Adults engage in it, too. From online vigilantism and angry blogs to e-stalking and anonymous ranting on newspaper Web sites, grownups can be as abusive as the meanest schoolhouse tyrant.

The suicide of 13-year-old Megan Meier in 2006 thrust adult cyberbullying into the open. The Dardenne Prairie, Mo., girl killed herself after receiving cruel messages on MySpace from impostors posing as a 16-year-old boy named "Josh Evans."

Lori Drew, the mother of one of Megan's friends, was accused of participating in the hoax along with her teenage daughter and a former teenage employee. Drew has denied sending messages to Megan.

While questions remain about Drew's role, the case has left no doubt that the Internet is rife with adult cyber passion.

After the suicide came to light, an outraged mother several states away ferreted out Drew's identity and posted it on a blog.

Soon, "an army of Internet avengers ... set out to destroy Lori Drew and her family," forcing them from their home and "vowing them no peace, ever," newspaper columnist Barbara Shelly wrote. "Who are these people who have made it their business to destroy her? They are a jury with laptops, their verdict rendered without insight into the dynamics of two families or the state of mind of a fragile 13-year-old girl or even a complete explanation of what actually occurred."

Internet shaming is a growing cultural phenomenon, but Daniel Solove, a professor of law at George Washington University and author of the 2007 book "The Future of Reputation: Gossip, Rumor and Privacy on the Internet," said it can backfire.

"Internet shaming is done by people who want actually to enforce norms and to make people and society more orderly," he said.

ORIGINAL ARTICLE

Adults Responsible for Internet Abuse, Too

Almost all of our cyberpaths bully and torment their victims when they find out they have been busted & exposed. Victims who are already physically and emotional sick with PTSD and trauma. However, shaming the only justice they will recieve until laws change. Vigilantes? We think not. - EOPC
loserville
Cyberbullying isn't just a problem among adolescents. Adults engage in it, too. From online vigilantism and angry blogs to e-stalking and anonymous ranting on newspaper Web sites, grownups can be as abusive as the meanest schoolhouse tyrant.

The suicide of 13-year-old Megan Meier in 2006 thrust adult cyberbullying into the open. The Dardenne Prairie, Mo., girl killed herself after receiving cruel messages on MySpace from impostors posing as a 16-year-old boy named "Josh Evans."

Lori Drew, the mother of one of Megan's friends, was accused of participating in the hoax along with her teenage daughter and a former teenage employee. Drew has denied sending messages to Megan.

While questions remain about Drew's role, the case has left no doubt that the Internet is rife with adult cyber passion.

After the suicide came to light, an outraged mother several states away ferreted out Drew's identity and posted it on a blog.

Soon, "an army of Internet avengers ... set out to destroy Lori Drew and her family," forcing them from their home and "vowing them no peace, ever," newspaper columnist Barbara Shelly wrote. "Who are these people who have made it their business to destroy her? They are a jury with laptops, their verdict rendered without insight into the dynamics of two families or the state of mind of a fragile 13-year-old girl or even a complete explanation of what actually occurred."

Internet shaming is a growing cultural phenomenon, but Daniel Solove, a professor of law at George Washington University and author of the 2007 book "The Future of Reputation: Gossip, Rumor and Privacy on the Internet," said it can backfire.

"Internet shaming is done by people who want actually to enforce norms and to make people and society more orderly," he said.

ORIGINAL ARTICLE

Friday, December 3, 2010

Killer Used Facebook to Communicate

By Lori Brown

Prisoners are supposed to get limited contact with the outside world. That's why they're in prison - to be removed from the outside world. But at least one prisoner found a way to stay connected, in real time, through Facebook.

For months, convicted murderer William Joseph Hogan used Facebook to mentally escape prison life, communicating with friends from all over, as well as his mother.

"If the pen gets any better, I might not want to leave," he wrote in one post. "Tattoos dirt cheap, sleep all day, play volleyball, sun tan, workout and read."

Hogan's posts came from behind bars as he serves a life sentence at the Central Mississippi Correctional Facility.

"Hello free world folks, hope everyone is doing well," he wrote in one post.

"Good thing I have a way to stay in touch with my 'friends,'" he wrote in another.

Hogan was imprisoned for murdering Reba Garrett's granddaughter, Wendy Renee Thweatt Hogan, just over two hears ago in Horn Lake.

"He shot her eight times," Garrett said. "We had to have her cremated. We didn't get to say goodbye."

Garrett's three great-grandchildren were in the home as Hogan killed the only parent they had left. Their dad died in a car crash. They now live with their aunt.

"It changed their life forever," Garrett said.

There's been little change for Hogan, though, according to his posts on Facebook.
He lists himself as widowed, and interested in dating and relationships with women.

"He's trying to act like he's an ordinary guy. (He posted) Pictures of himself in a boat. Sitting there in a boat like, ''Here, I'm just a regular, Joe,'" Garrett said.

"No, you're not widowed, you killed your wife!"

Hogan has broken the correction center's rules time and time again by using a cell phone. On Facebook, he's even posted swastikas and other Nazi symbols.

One Facebook friend replied, "Lol I didn't know they let u guys use Facebook."In another post, Hogan wrote, "Just got through visiting my mama everything went great..."

His mother wrote back,"I enjoyed my visit with you too. You are a great young man... you make a bad situation the best you can. Love ya."

Action News 5 asked Mississippi's Department of Corrections why Hogan was allowed to be on Facebook. At first, corrections officials thought someone from the free world may have been making posts on Hogan's behalf, because prisoners do not have Facebook access.

But the following day, a spokesperson replied in an email, saying, "Thank you Ms. Brown for bringing this to our attention. When we find instances where inmates have violated the rules, measures are taken. MDOC has
reported to Facebook that this is an illegal account."

According to Mississippi State Senator Merle Flowers, with 21,000 inmates across the state, things like this are bound to happen.

"We want to thank Action News 5 for bringing it to our attention," she said. "Certainly,
you don't know about some things until people tell you about them."

MDOC placed Hogan on lock down, and transferred him to the Mississippi State Penitentiary at Parchman, home of the new Operation Cellblock. There, new technology intercepts illegal cell phone transmissions by inmates.

"It could have gone on for months or years," Garrett said.

Before prison officials shut down Hogan's Facebook account, his final post read, "Nothing goin on down here". Maybe now that's a little more accurate.

MDOC says the new cell phone blocking technology marks a turning point. The Mississippi State Penitentiary at Parchman was the first prison to use the new technology in the United States. During its first month of operation, the state intercepted nearly 216,000 illegal phone calls.

The technology is expected to be in place in all Mississippi State prisons within this fiscal year.

Popular Posts

Blog Archive