Forums before death by AOL, social media and spammers... "We can't have nice things"
|    sci.med.psychobiology    |    Dialog and news in psychiatry and psycho    |    4,736 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 3,007 of 4,736    |
|    Dr. AR Wingnutte, PhD to All    |
|    The Use of Technology to Stalk (1/2)    |
|    07 Oct 14 12:31:20    |
      From: drarwingnuttephd@gmail.com              The Use of Technology to Stalk                     Stalkers often use technology to assist them in stalking their victims. This       section provides information about how different technologies can be used to       stalk, measures victims can take to keep safe, and additional information and       resources.              For more information, sign up for The Use of Technology to Stalk online       course. This self-paced, interactive online training, produced by the       Stalking Resource Center of the National Center for Victims of Crime with       funding from the Office for Victims        of Crime, U.S. Department of Justice, will increase the ability of criminal       justice professionals and victim service providers to recognize how stalkers       use technology.              Technology and Stalking       Computers and the Internet       Phones       Global Positioning Systems (GPS)       Addtional Resources       Technology and Stalking              Eliminating Cyber-Confusion        Intimate Partner Violence, Technology, and Stalking       Technology Safety & Advocacy From the National Online Resource Center on       Violence Against Women       Stalking Technology Outpaces State Laws       New Frontiers of Stalking - Video Voyeurism       High-Tech Twist on Abuse       A High-Tech Twist on Abuse: Technology, Intimate Partner Stalking, and Advocacy              Also See       How I stalked my girlfriend       Stalking by a High-tech Guy       Stalking Victim Uncovers Dark Side of Technology        Computers and the Internet              If stalkers have access to a victim's computer, they can track them by looking       at the history or websites visited on the computer. Spyware software on       computers (sometimes sent through e-mail) can send stalkers a copy of every       keystroke made, including        passwords, Web sites visited, and e-mails sent by victims.               Stalkers can also use the Internet to contact or post things about the victim       on message board or discussion forums. They may also verbally attack or       threaten victims in chat rooms. Some stalkers will post threatening or       personal information about the        victim ? including the victim's full name and address. Often stalkers will       e-mail the victim, or fill their in-box with spam and have been known to send       viruses or other harmful programs to victims' computers.              For more information see:              AOL/National Cyber Security Alliance Online Safety Study       Cyberstalking: The Dangers on the Information Superhighway       Protecting your Computer: Avoiding and Removing Spyware - From the       Anti-spyware Coalition       Microsoft Online Safety       Social Networking Sites       Social Networking Sites: A Bonanza for Stalkers?       Mining Social Networks for Clues Social Networking Sites: A Parent's Guide -       From the Federal Trade Commission       Social Media & Mobile Internet Use Among Teens and Young Adults - From Pew       Research Center       From the National Network to End Domestic Violence Safety Net National Safe &       Strategic Technology Project:       Internet and Computer Safety..."tips if you are in danger"       Tech Savvy Teens       Who's Spying on Your Computer? Spyware, Surveilliance, and Safety for Survivors       Privacy and Safety on Facebook       From Privacy Rights Clearinghouse:       Are you being stalked? Tips for Protection       Online Privacy: Using the Internet Safely       Public Records on the Internet: The Privacy Dilemma       Security Recommendations for Stalking Victims       From the U.S. Computer Emergency Readiness Team:       Spyware       Staying Safe on Social Network Sites        Using Instant Messaging and Chat Rooms Safely       Understanding Anti-Virus Software       Using Wireless Technology Securely       Virus Basics       Phones              Telephones and cellular phones can be used to threaten or harass. Cell phones       also have features that can be used against victims.              For more information see:              Caller ID Spoofing - Changing Caller ID to show any desired number on a       recipient's Caller ID display.        Spoofem.com misleads on its efforts to combat misuse of spoofing technology       On November 16, 2010, SpoofEm.com issued a press release stating that they       were the only spoofing company that was paying attention to the possible       misuses of spoof technology through two mechanisms. First, they offered a       service to check a phone number        against their database to see if a spoof call had ever been placed to that       number. Second, they offered a fee service to block your number to prevent       spoof calls from being made to that number. The Stalking Resource Center       tested these claims after using        SpoofEm.com's spoofing services. For the first, we found that the phone number       check service failed to provide accurate information. Phone numbers that we       had used in placing spoofed calls were not reported as having been spoofed.               Our attempts to test the second service - the number blocking - were hampered       by technical difficulties with SpoofEm.com's website and attempts to have the       issue resolved via their technical support have gone unanswered.               The fact that these services do not appear to work can endanger victims and       mislead criminal justice system personnel in their response to stalking. We       encourage SpoofEm.com to investigate and address these issues.        Cellphone Spying: Is your life being monitored?       Tapping your cell phone       From Privacy Rights Clearinghouse:       Caller ID and My Privacy       How to Put an End to Unwanted or Harassing Phone Calls        Hang up on Harassment: Dealing with Cellular Phone Abuse       Privacy in the Age of the Smartphone       Protect your Cell Phone Records       Wireless Communication: Voice and Data Privacy        Wiretapping and Easedropping on Telephone Calls       From Pew Research Center:       Teens, Cell Phones and Texting       Also see:       Cell phones won't keep your secrets        Protecting your cell phone        How to harden your smartphone against stalkers - Android edition       Global Positioning Systems              Global Positioning System (GPS) technology can be used to track or follow       victims.              For more information see:              Every Step You Take... Every Move You Make... My GPS Unit Will Be Watching You       - From Popular Science magazine               Additional Resources              Anti-spyware Coalition       Domestic Violence & Stalking in a Digital Age: Information for Community       Corrections Agencies and Professionals from Perspectives: The Journal of the       American Probation and Parole Association       Electronic Information Privacy Center       International Center for Disability Resources on the Internet       National Network to End Domestic Violence Safety Net Technology Safety Project       Online Privacy Alliance       Privacy Rights Clearinghouse       Online Resources              NetSmartz       OnGuard Online       StaySafeOnline.org (National Cyber Security Alliance)                     Read More:              http://www.victimsofcrime.org/our-programs/stalking-resource-cen       er/stalking-information/the-use-of-technology-to-stalk              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca