Cyberstalking

<<

~evilanne

Posts: 2860

Joined: Mon Jan 20, 2003 10:50 pm

Post Sat Dec 20, 2003 6:10 pm

Cyberstalking

I would like to hear some good stories on this topic. They say you leave a trail where ever you go on the internet. Locally, they just busted a guy for arranging a meeting with a teenage girl over the internet. Although, this probably isn't a stalking charge...but they seem to be pretty good when it comes to minors. Paranoid...how old did you say you were...17 ??
Happy Trails :)
evilanne
<<

paranoid

Posts: 1915

Joined: Tue Oct 14, 2003 1:03 pm

Location: in the library

Post Sat Dec 20, 2003 11:27 pm

Righto, mate. plus, all sorts of business laws are broken. There's a guy in town, used to work for highspeed as their attny, now does internet law, just spoke here two months ago, all sorts of laws. I understand there's always a trail, too. I just poked around for that cop that pretends he's a young girl to bust lurkers, gotta get busy and find him.

What about NOW, if there are victims involved? What about Women's Nat'l Law Center? Children's defense fund? CDF usually has great info.

Computers and Crime. (2000). IT Law Lecture Notes. Revised 3 October Available at http://www.law.auckland.ac.nz/itlaw/itlawhome.htm.

CyberAngels. Available at http://www.cyberangels.org

Cyberstalking. (1999). November. Available at
http://www.victimsofviolence.on.ca/cyber.htm

Dean, K. (2000). The Epidemic of Cyberstalking. Wired News.
http://www.wired.com/news/politics/0,1283,35728,00.html
Ellison, L. (1999). Cyberspace 1999: Crime, Criminal Justice and the Internet. 14th
BILETA Conference. York. England. Available at
http://www.bileta.ac.uk/99papers/ellison.html.

Ellison, L. & Akdeniz, Y. (1998).Ǥyber-Stalking: the Regulation of Harassment on the
Internet. Criminal Law Review, Special Edition: Crime, Criminal Justice and the
Internet, 29-48. December. Available at http://www.cyberrights.
org/documents/stalking
Cyberstalking. Link-Up, 17(4). Available at
http://www.infotoday.com/lu/jul00/hitchcock.htm
ISE. The Internet No1 Close Protection Resource. Available at http://www.intelsec.
demon.co.uk
Jenson, B. (1996). Cyberstalking: Crime, Enforcement and Personal Responsibility of the
On-Line World. S.G.R. MacMillan. Available at http://www.sgrm.com/art-8.htm
Mannix, M., Locy, T., Clarck, K., Smith, A.K., Perry, J. McCoy, F., Fischer, J., Glasser, J.
& Kaplin, D.E. (2000). The WebÃÔ Dark Side in the Shadows of Cyberspace, an
ordinary week is a frightening time. U.S. News & World Report, 28 August:
Washington.
Report on Cyberstalking. Cyberstalking: A New Challenge for Law Enforcement and
Industry, 1999. A report from the Attorney General to the vice President. August.
Available at http://www.usdoj.gov/criminal/cybercrim ... alking.htm

Most of these are reeach or reports, but there should be references to other authors, documants, that would be helpful.

Maybe Genmod should move this thread to cyberstalking?
Virginal Cindy the upright and stalwart
<<

paranoid

Posts: 1915

Joined: Tue Oct 14, 2003 1:03 pm

Location: in the library

Post Sat Dec 20, 2003 11:50 pm

How to select a secure password
Your network account is required to have a password to keep other people out of your account. On the Whitman College network your password is like a suit of armour, it protects you in many vital areas - it protects your email communications. If someone can gain access to your account they can delete your files, read your mail, and even mess things up so much you won't be able to log in again.

It also guards your privacy, even if you think you have nothing valuable saved there. If someone from outside the school gains access to your account, they can use it to maliciously attack the whole system. Your personal password ensures that our shared resources are secure against vandalism and abuses. With this well crafted armor in place you can have a greater degree of confidence in the reliability and security of the Whitman network.

To choose a secure password consider all of the following:

Your password should be at least five but not more than eight characters long.

Your password should contain combinations of numbers, UPPER and lower case letter, and/or symbols such as !@#*?. There are 456976 different possibilities for passwords using only four alphabetic characters of the same case, but over 1,000,000,000,000,000 possible eight character passwords using both cases, numbers, and symbols.

The system stores your real name along with your username, therefore it is very important not to choose any part of your real name as your password. Names of family members, names of pets, or any other personal names also make bad passwords.

Do not use any word found in the dictionary as your password. Many password cracking programs use the dictionary to try to break in, since this is much faster than trying all combinations of characters. Foreign Language dictionaries are also used for the same purpose, so avoid them as well.

Appending numbers and symbols to dictionary words also doesn't help much. Programs can easily be set to try word1, word2, etc.

Computer and sci-fi jargon and acronyms are often used as passwords, so many cracking programs have a jargon dictionary included for words not in the English language. Jargon from other areas (such as legal jargon) is also unsafe.

People like passwords that are easy to remember and type, but some passwords that meet many of the requirements above are over-used and easily guessed. Do not use sequences like 123456 or qwerty as a password.
Virginal Cindy the upright and stalwart
<<

genmod

Posts: 23

Joined: Mon Nov 17, 2003 6:19 pm

Post Sun Dec 21, 2003 11:04 am

I'll look into how to move it. Haven't moved a post before.
Stalking Victims Sanctuary
Discussion Boards Moderator
moderator@stalkingvictims.com
<<

verumneu

Posts: 454

Joined: Tue Sep 23, 2003 8:52 am

Post Sun Dec 21, 2003 11:57 am

good info paranoid. I was checking some of the links out. There are a couple that won't display pages, but the rest are great. Thanks.
<<

paranoid

Posts: 1915

Joined: Tue Oct 14, 2003 1:03 pm

Location: in the library

Post Sun Dec 21, 2003 1:39 pm

I got it from another, forgotten, source, and have also had trouble opening the links. Sometimes this works: take part of the addy off the right of the string. then find a "search the site" place and plug in the document name. OR google the document name.

Found the source: Paper by Angela Maxwell, unpublished, I think, but on the internet.

Government cyper crime report site: http://www.usdoj.gov/criminal/cybercrime/reporting.htm
Virginal Cindy the upright and stalwart

Return to Success Stories - Archive

Who is online

Users browsing this forum: No registered users and 1 guest

cron
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software Change colors.