home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   sci.med.psychobiology      Dialog and news in psychiatry and psycho      4,736 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 3,007 of 4,736   
   Dr. AR Wingnutte, PhD to All   
   The Use of Technology to Stalk (1/2)   
   07 Oct 14 12:31:20   
   
   From: drarwingnuttephd@gmail.com   
      
   The Use of Technology to Stalk   
      
      
   Stalkers often use technology to assist them in stalking their victims. This   
   section provides information about how different technologies can be used to   
   stalk, measures victims can take to keep safe, and additional information and   
   resources.   
      
   For more information, sign up for The Use of Technology to Stalk online   
   course. This  self-paced, interactive online training, produced by the   
   Stalking Resource Center of the National Center for Victims of Crime with   
   funding from the Office for Victims    
   of Crime, U.S. Department of Justice, will increase the ability of criminal   
   justice professionals and victim service providers to recognize how stalkers   
   use technology.   
      
   Technology and Stalking   
   Computers and the Internet   
   Phones   
   Global Positioning Systems (GPS)   
   Addtional Resources   
   Technology and Stalking   
      
   Eliminating Cyber-Confusion    
   Intimate Partner Violence, Technology, and Stalking   
   Technology Safety & Advocacy From the National Online Resource Center on   
   Violence Against Women   
   Stalking Technology Outpaces State Laws   
   New Frontiers of Stalking - Video Voyeurism   
   High-Tech Twist on Abuse   
   A High-Tech Twist on Abuse: Technology, Intimate Partner Stalking, and Advocacy   
      
   Also See   
   How I stalked my girlfriend   
   Stalking by a High-tech Guy   
   Stalking Victim Uncovers Dark Side of Technology    
   Computers and the Internet   
      
   If stalkers have access to a victim's computer, they can track them by looking   
   at the history or websites visited on the computer. Spyware software on   
   computers (sometimes sent through e-mail) can send stalkers a copy of every   
   keystroke made, including    
   passwords, Web sites visited, and e-mails sent by victims.    
      
   Stalkers can also use the Internet to contact or post things about the victim   
   on message board or discussion forums. They may also verbally attack or   
   threaten victims in chat rooms. Some stalkers will post threatening or   
   personal information about the    
   victim ? including the victim's full name and address. Often stalkers will   
   e-mail the victim, or fill their in-box with spam and have been known to send   
   viruses or other harmful programs to victims' computers.   
      
   For more information see:   
      
   AOL/National Cyber Security Alliance Online Safety Study   
   Cyberstalking: The Dangers on the Information Superhighway   
   Protecting your Computer: Avoiding and Removing Spyware - From the   
   Anti-spyware Coalition   
   Microsoft Online Safety   
   Social Networking Sites   
   Social Networking Sites: A Bonanza for Stalkers?   
   Mining Social Networks for Clues  Social Networking Sites: A Parent's Guide  -   
   From the Federal Trade Commission   
   Social Media & Mobile Internet Use Among Teens and Young Adults - From Pew   
   Research Center   
   From the National Network to End Domestic Violence Safety Net National Safe &   
   Strategic Technology Project:   
   Internet and Computer Safety..."tips if you are in danger"   
   Tech Savvy Teens   
   Who's Spying on Your Computer? Spyware, Surveilliance, and Safety for Survivors   
   Privacy and Safety on Facebook   
   From Privacy Rights Clearinghouse:   
   Are you being stalked? Tips for Protection   
   Online Privacy: Using the Internet Safely   
   Public Records on the Internet: The Privacy Dilemma   
   Security Recommendations for Stalking Victims   
   From the U.S. Computer Emergency Readiness Team:   
   Spyware   
   Staying Safe on Social Network Sites    
   Using Instant Messaging and Chat Rooms Safely   
   Understanding Anti-Virus Software   
   Using Wireless Technology Securely   
   Virus Basics   
   Phones   
      
   Telephones and cellular phones can be used to threaten or harass. Cell phones   
   also have features that can be used against victims.   
      
   For more information see:   
      
   Caller ID Spoofing - Changing Caller ID to show any desired number on a   
   recipient's Caller ID display.    
   Spoofem.com misleads on its efforts to combat misuse of spoofing technology   
   On November 16, 2010, SpoofEm.com issued a press release stating that they   
   were the only spoofing company that was paying attention to the possible   
   misuses of spoof technology through two mechanisms. First, they offered a   
   service to check a phone number    
   against their database to see if a spoof call had ever been placed to that   
   number. Second, they offered a fee service to block your number to prevent   
   spoof calls from being made to that number. The Stalking Resource Center   
   tested these claims after using    
   SpoofEm.com's spoofing services. For the first, we found that the phone number   
   check service failed to provide accurate information. Phone numbers that we   
   had used in placing spoofed calls were not reported as having been spoofed.    
      
   Our attempts to test the second service - the number blocking - were hampered   
   by technical difficulties with SpoofEm.com's website and attempts to have the   
   issue resolved via their technical support have gone unanswered.    
      
   The fact that these services do not appear to work can endanger victims and   
   mislead criminal justice system personnel in their response to stalking.  We   
   encourage SpoofEm.com to investigate and address these issues.      
   Cellphone Spying: Is your life being monitored?   
   Tapping your cell phone   
   From Privacy Rights Clearinghouse:   
   Caller ID and My Privacy   
   How to Put an End to Unwanted or Harassing Phone Calls    
   Hang up on Harassment: Dealing with Cellular Phone Abuse   
   Privacy in the Age of the Smartphone   
   Protect your Cell Phone Records   
   Wireless Communication: Voice and Data Privacy    
   Wiretapping and Easedropping on Telephone Calls   
   From Pew Research Center:   
   Teens, Cell Phones and Texting   
   Also see:   
   Cell phones won't keep your secrets    
   Protecting your cell phone    
   How to harden your smartphone against stalkers - Android edition   
   Global Positioning Systems   
      
   Global Positioning System (GPS) technology can be used to track or follow   
   victims.   
      
   For more information see:   
      
   Every Step You Take... Every Move You Make... My GPS Unit Will Be Watching You   
   - From Popular Science magazine   
      
    Additional Resources   
      
   Anti-spyware Coalition   
   Domestic Violence & Stalking in a Digital Age: Information for Community   
   Corrections Agencies and Professionals from Perspectives: The Journal of the   
   American Probation and Parole Association   
   Electronic Information Privacy Center   
   International Center for Disability Resources on the Internet   
   National Network to End Domestic Violence Safety Net Technology Safety Project   
   Online Privacy Alliance   
   Privacy Rights Clearinghouse   
   Online Resources   
      
   NetSmartz   
   OnGuard Online   
   StaySafeOnline.org (National Cyber Security Alliance)   
      
      
   Read More:   
      
   http://www.victimsofcrime.org/our-programs/stalking-resource-cen   
   er/stalking-information/the-use-of-technology-to-stalk   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca