Thursday, December 31, 2009

EU Parliament to investigate a Flu Scandal

This entry arrived in one of my 'Mail Boxes' this evening.

-------------------------------------------

European Parliament to Investigate WHO and “Pandemic” Scandal

by F. William Engdahl


The Council of Europe member states will launch an inquiry in January 2010 on the influence of the pharmaceutical companies on the global swine flu campaign, focusing especially on extent of the pharma‘s industry’s influence on WHO. The Health Committee of the EU Parliament has unanimously passed a resolution calling for the inquiry. The step is a long-overdue move to public transparency of a “Golden Triangle” of drug corruption between WHO, the pharma industry and academic scientists that has permanently damaged the lives of millions and even caused death.

The parliament motion was introduced by Dr. Wolfgang Wodarg, former SPD Member of the German Bundestag and now Chairman of the European Parliament Health Committee. Wodarg is a medical doctor and epidemiologist, a specialist in lung disease and environmental medicine, who considers the current “pandemic” Swine Flu campaign of the WHO to be “one of the greatest medicine scandals of the Century.”

The text of the resolution just passed by a sufficient number in the Council of Europe Parliament says among other things, “In order to promote their patented drugs and vaccines against flu, pharmaceutical companies influenced scientists and official agencies, responsible for public health standards to alarm governments worldwide and make them squander tight health resources for inefficient vaccine strategies and needlessly expose millions of healthy people to the risk of an unknown amount of side-effects of insufficiently tested vaccines. The "bird-flu"-campaign (2005/06) combined with the "swine-flu"-campaign seem to have caused a great deal of damage not only to some vaccinated patients and to public health-budgets, but to the credibility and accountability of important international health-agencies.”

The Parliamentary inquiry will look into the issue of „falsified pandemic“ that was declared by WHO in June 2009 on the advice of its group of academic experts, SAGE, many of whose members have been documented to have intense financial ties to the same pharmaceutical giants such as GlaxoSmithKline, Roche, Novartis, who benefit from the production of drugs and untested H1N1 vaccines. They will investigate the influence of the pharma industry in creation of a worldwide campaign against the so-called H5N1 “Avian Flu” and H1N1 Swine Flu. The inquiry will be given “urgent” priority in the general assembly of the parliament.

In his official statement to the Committee, Wodarg criticized the influence of the pharma industry on scientists and officials of WHO, stating that it has led to the situation where “unnecessarily millions of healthy people are exposed to the risk of poorly tested vaccines,” and that, for a flu strain that is “vastly less harmful” than all previous flu epidemics.

Wodarg says the role of the WHO and its the pandemic emergency declaration in June needs to be the special focus of the European Parliamentary inquiry. For the first time, the WHO criteria for a pandemic was changed in April 2009 as the first Mexico cases were reported, to make not the actual risk of a disease but the number of cases of the disease basis to declare “Pandemic.” By classifying the swine flu as pandemic, nations were compelled to implement pandemic plans and also the purchase swine flu vaccines. Because WHO is not subject to any parliamentary control, Wodarg argues it is necessary for governments to insist on accountability.

The inquiry will also to look at the role of the two critical agencies in Germany issuing guidelines on the pandemic, the Paul-Ehrlich and the Robert-Koch Institute.

(http://www.globalresearch.ca/index.php?context=va&aid=16667)

Monday, December 21, 2009

Facebook Account Compromised? - Read on...

Facebook Account Compromised?

Re-produced from Facebooks own Security Pages

My friend's account


It is possible that malicious software was downloaded to your friend's computer or that their login information was phished in an attempt to send spam from their profile.
We would like to investigate this issue further, but unfortunately, we cannot release information regarding a user’s account to anyone but the account holder.

For detailed information about this matter, please click here -
http://www.facebook.com/help/?faq=13394

We are currently working with people whose accounts have been affected by money transfer scams.
Please use caution around messages from friends claiming to be stranded and asking for money.

Your friend's Facebook account may have been compromised by cybercriminals attempting to impersonate them. Most frequently, these criminals will gain control of a Facebook account, and use the Chat or Status features to claim they are stuck in a far away location and in need of financial assistance.

If you have received a message like this, please enter your friend's account information in this form so that we can make sure your friend's account is secure. http://www.facebook.com/help/?faq=14257

My account


If you are having general trouble logging in to your Facebook account, please click here for more information. http://www.facebook.com/help/?faq=15468

We are currently working with people whose accounts have been affected by money transfer scams

The money transfer scam is characterized by cybercriminals using Facebook in an attempt to trick your friends into sending them money.
Most frequently, these criminals will gain control of a Facebook account, and use the Chat or Status features to claim that you are stuck in a far away location and in need of financial assistance.

It is possible that your email account was compromised as well, as obtaining access to a victim’s email is one of the primary ways these cybercriminals have been operating.
Please take the following steps to ensure the security of your Facebook account:
  1. Select a unique and complex password for your Facebook account and keep this entirely to yourself. You can do this from the Account Settings page of your Facebook account or by using the "Forgot Password" link on the login page.

  2. Select a new, unique password for any email address associated with your account, making sure to avoid using the same password for any account.

  3. Verify that you control all of the email addresses associated with your account on the Contact Email section at:

  4. https://www.facebook.com/editaccount.php

  5. Add a security question to your account from the Account Settings page if you have not done so already.

  6. Visit the following page for more information about Facebook security and how to report suspicious material:

  7. http://www.facebook.com/security
If you require further assistance in securing your account, please enter your account information in this form so that we can make sure your account is secure. http://www.facebook.com/help/?faq=15111

The FTC has created an alert, titled "Money Transfers Can Be Risky Business", that explains money transfer scams and other actions one can take. http://www.facebook.com/help/?faq=16148

It is possible that malicious software was downloaded to your computer or that your password was stolen by a phishing website designed to look like Facebook.

Please carefully follow the steps provided:
  1. Run anti-virus software: If your computer has been infected with a virus or with malware, you will need to run anti-virus software to remove these harmful programs and keep your information secure.

  2. Reset password: From the Account Setting page, you will need to create a new password. Be sure to use a different password than you use for other sites or services, made up of a complex string of numbers, letters, and punctuation marks that is at least six characters in length. Do not use words found in the dictionary.

  3. Never click suspicious links: It is possible that your friends could unwillingly send spam, viruses, or malware through Facebook if their accounts are infected. Do not click this material and do not run any ".exe" files on your computer without knowing what they are. Also, be sure to use the most current version of your browser as they contain important security warnings and protection features. Current versions of Firefox and Internet Explorer warn you if you have navigated to a suspected phishing site, and we recommend that you upgrade your browser to the most current version. You can also find more information about phishing and how to avoid it at http://www.antiphishing.org/consumer_recs.html and http://onguardonline.gov/phishing.html.

    Phishing is an online attempt to trick a user by pretending to be an official login page or an official email from an organization that you would have an account with, such as a bank or an email provider, in order to obtain a user’s login and account information. In the case of a phishing login page, the login page may look identical to the login page you would normally go to, but the website does not belong to the organization you have an account with (the URL web address of the website should reflect this). In the case of a phishing email, the email may look like an email you would get from the organization you have an account with and get emails from, but the link in the email that it directs you to takes you to the above phishing login page, rather than a legitimate login page for that organization.

    To prevent your account information from being obtained in a phishing scheme, only log in to legitimate pages of the websites you have an account with. For example, "www.facebook.example.com" is not a legitimate Facebook page on the "www.facebook.com" domain, but "www.facebook.com/example" is a legitimate Facebook page because it has the "facebook.com" domain. When in doubt, you can always just type in "facebook.com" into your browser to return to the legitimate Facebook site.
If you are still unable to access your profile, please send us more information regarding the issue so we can investigate. Please submit your report here.

If your account has been hacked and you can still access your login email address, please attempt to reset the password to your account by selecting the "Forgot your password?" link that appears above the Password field on the Facebook Login page. An email will be sent to you with steps for completing the process.

If your account has been hacked and the login email on your account has also been compromised or has been changed, please send us information about the account so we can look into it further and hopefully restore access. Please submit your report here.

It is possible that malicious software was downloaded to your computer or that your password was stolen by a phishing website designed to look like Facebook.

Please carefully follow the steps provided:
  1. Run anti-virus software: If your computer has been infected with a virus or with malware, you will need to run anti-virus software to remove these harmful programs and keep your information secure.

  2. Reset password: From the Account Setting page, you will need to create a new password. Be sure to use a different password than you use for other sites or services, made up of a complex string of numbers, letters, and punctuation marks that is at least six characters in length. Do not use words found in the dictionary.

  3. Never click suspicious links: It is possible that your friends could unwillingly send spam, viruses, or malware through Facebook if their accounts are infected. Do not click this material and do not run any ".exe" files on your computer without knowing what they are. Also, be sure to use the most current version of your browser as they contain important security warnings and protection features. Current versions of Firefox and Internet Explorer warn you if you have navigated to a suspected phishing site, and we recommend that you upgrade your browser to the most current version. You can also find more information about phishing and how to avoid it at http://www.antiphishing.org/consumer_recs.html and http://onguardonline.gov/phishing.html.

    Phishing is an online attempt to trick a user by pretending to be an official login page or an official email from an organization that you would have an account with, such as a bank or an email provider, in order to obtain a user’s login and account information. In the case of a phishing login page, the login page may look identical to the login page you would normally go to, but the website does not belong to the organization you have an account with (the URL web address of the website should reflect this). In the case of a phishing email, the email may look like an email you would get from the organization you have an account with and get emails from, but the link in the email that it directs you to takes you to the above phishing login page, rather than a legitimate login page for that organization.

    To prevent your account information from being obtained in a phishing scheme, only log in to legitimate pages of the websites you have an account with. For example, "www.facebook.example.com" is not a legitimate Facebook page on the "www.facebook.com" domain, but "www.facebook.com/example" is a legitimate Facebook page because it has the "facebook.com" domain. When in doubt, you can always just type in "facebook.com" into your browser to return to the legitimate Facebook site.
If you are still unable to access your profile, please send us more information regarding the issue so we can investigate. Please submit your report here.

Unfortunately, Facebook did not develop the third-party poker application and cannot assist you in restoring any lost poker chips. This application is developed and operated by a third party that runs its own technical resources, and we do not have access to this data.

Please reset your password immediately for security reasons, and contact the developer of this application in regards to your situation. In order to contact the developer who created this application, please go to the application's About Page and click on the "Contact Developer" link at the bottom of the page. Facebook is not responsible for the support provided by this developer. If you continue to have problems, please note that you can remove and restrict applications from the "Applications" section of the Privacy page.

If you have received a Facebook account confirmation email in error, it's likely that someone has mistakenly attempted to register using your email address. As long as you do not click the link contained in the email, no action will be taken, and no account will be created. http://www.facebook.com/help/?faq=14348

Please note that is not technically possible to hack a Facebook group. As long as the current administrators of a group keep their login details secure, keep their account enabled, and do not allow any suspicious people to become admins, then the group will remain secure. Please note, however, that if a group is left without an admin, any member will be able to assume that role. If this situation occurs, we encourage you or the former admin of this group to contact the current admin to resolve this matter. Unfortunately, Facebook is not able to add you back as an admin for any group.

In addition, as long as the group does not contain information that violates our Terms of Use, we will not take any action it. For more information on conduct prohibited by Facebook, please read ourStatement of Rights and Responsibilities, which can be accessed by clicking on the "Terms" link at the bottom of any Facebook page. http://www.facebook.com/help/?faq=15654

More information


Phishing is an online attempt to trick users into providing login and account information by pretending to be a login page or email from an official organization. Common examples include banks or email providers.

In the case of a phishing login page, the login page may look identical to the login page you would normally go to. However, in these instances the website does not belong to the organization you have an account with (the URL web address of the website should reflect this).

In the case of a phishing email, the email may look like an email you would receive from the organization you have an account with. However, the links provided in these emails typically direct you to the above phishing login page, rather than a legitimate login page for that organization.

To prevent your account information from being obtained in a phishing scheme, please double check the URL of the websites you have an account with. For example, "www.facebook.example.com" is not a legitimate Facebook page on the "www.facebook.com" domain, but "www.facebook.com/example" is a legitimate Facebook page because it has the "facebook.com" domain. When in doubt, you can always just type in "facebook.com" into your browser to return to the legitimate Facebook site.

Please note that current versions of Firefox and Internet Explorer warn you if you have navigated to a suspected phishing site, and we recommend that you upgrade your browser to the most current version. You can also find more information about phishing and how to avoid it at...


  1. Never click suspicious links: It is possible that your friends could unwillingly send spam, viruses, or malware through Facebook if their accounts are infected. Do not click this material and do not run any ".exe" files on your computer without knowing what they are. Also, be sure to use the most current version of your browser as they contain important security warnings and protection features. Current versions of Firefox and Internet Explorer warn you if you have navigated to a suspected phishing site, and we recommend that you upgrade your browser to the most current version. You can also find more information about phishing and how to avoid it at http://www.antiphishing.org/consumer_recs.html and http://onguardonline.gov/phishing.html.

    Phishing is an online attempt to trick a user by pretending to be an official login page or an official email from an organization that you would have an account with, such as a bank or an email provider, in order to obtain a user’s login and account information. In the case of a phishing login page, the login page may look identical to the login page you would normally go to, but the website does not belong to the organization you have an account with (the URL web address of the website should reflect this). In the case of a phishing email, the email may look like an email you would get from the organization you have an account with and get emails from, but the link in the email that it directs you to takes you to the above phishing login page, rather than a legitimate login page for that organization.

    To prevent your account information from being obtained in a phishing scheme, only log in to legitimate pages of the websites you have an account with. For example, "www.facebook.example.com" is not a legitimate Facebook page on the "www.facebook.com" domain, but "www.facebook.com/example" is a legitimate Facebook page because it has the "facebook.com" domain. When in doubt, you can always just type in "facebook.com" into your browser to return to the legitimate Facebook site.

  2. Have a unique, strong password: From the Account Settings page, be sure to use a different password than you use for other sites or services, made up of a complex string of numbers, letters, and punctuation marks that is at least six characters in length. Do not use words found in the dictionary.

  3. Run anti-virus software: If your computer has been infected with a virus or with malware, you will need to run anti-virus software to remove harmful programs and keep your information secure.

The FTC has created an alert, titled "Money Transfers Can Be Risky Business", that explains money transfer scams and other actions one can take.

Make sure that when you access the site, you always log in from a legitimate facebook.com domain. A good rule of thumb is if a URL ends in facebook.com, it is owned by Facebook. For example, "en-gb.facebook.com" ends in facebook.com and is therefore safe and legitimate.

When in doubt, just type "facebook.com" into your browser's address field. It's a good idea to bookmark the facebook.com address so that you don't have to enter it manually.

Other URLs that look like Facebook but do not follow this criterion could be illegitimate phishing websites. Never submit your login credentials to a site that looks suspicious.
http://www.facebook.com/help/?faq=15133

Facebook has enabled third-party websites to use Facebook’s login and authentication system through a program called Facebook Connect. Facebook Connect allows users to take their Facebook identity, network, and privacy settings with them as they browse and interact with the rest of the Web.

Connect-enabled sites often provide an option to log in to Facebook directly from the site itself. When you see this, you should make sure that the login opens in a separate browser pop-up window, and that the Web address (URL) for the pop-up contains the proper "www.facebook.com" domain. If it does, you’ll know that it’s a legitimate Facebook page and not a phishing attempt, and you can log in safely and securely.

Note: if you’re logged in to Facebook, the Facebook Connect partner site should only ask you to "authorize" that site. http://www.facebook.com/help/?faq=13929

Facebook respects your privacy. We do not distribute your user information to marketers or spammers. You can read more about this in our Privacy Policy. - http://www.facebook.com/help/?faq=12260
If you deactivate your account from the "Deactivate Account" section on the Account page, your profile and all information associated with it are immediately made inaccessible to other Facebook users. What this means is that you effectively disappear from the Facebook service.
However, if you want to reactivate at some point, we do save your profile information (friends, photos, interests, etc.), and your account will look just the way it did when you deactivated if you decide to reactivate it. Many users deactivate their accounts for temporary reasons and expect their information to be there when they return to the service.

If you do not think you will use Facebook again and would like your account deleted, please keep in mind that you will not be able to reactivate your account or retrieve any of the content or information you have added.

If you would like your account permanently deleted with no option for recovery, log in to your account and then submit your request by clicking here. - http://www.facebook.com/help/?faq=12271


Find more questions and answers here.

Friday, December 18, 2009

Internet Safety - Part 2

Internet Safety – ‘Cyber-Bullying’ is ‘Beatable’

By Dr. Peter James – Independent researcher, writer, and web tactician.

Yesterday Part 1 was published here...

Internet Safety Tips - Part 1

Part 2 follows on below.

Fraud Email
Everyone gets junk and scam emails, be it Mr ‘Microsoft’ Bill Gates, your favourite film star or singer, even me, efforts are made to curb this daily threat but without employing many of the suggestions in this article, it is a hard battle to win. Now my own spam emails received is low at around five or six items a week. If your IP address gets hi-jacked, you can send spam unknowingly. A few months ago whilst on holiday I found that despite not being on the Internet during the 5 days away that 1000+ spam emails had been sent using my IP address. The matter was resolved 6 weeks later and the offender caught, literally, no one is exempt from the ‘Cyber-Bully’ or Internet nastiness out there today.

There are always plausible reasons given to get you to respond to them, many are from banks that you do not have an account with at all. Never open or respond to them at all, if it is from your bank, go to the nearest branch and sort it out there, not over the Internet or phone, many bogus emails use false logos, and ghost embedded addresses to fool the recipients into responding. In the time it takes to re-read this paragraph, a computer operator elsewhere in another part of the world could electronically rob your bank account!

Have you brought anything in the last few days? Has anyone brought anything from you? Apart from the odd promotional email from ‘EBay’ or maybe a follow up question from a buyer or seller – You know who they are; there is no need for ‘EBay’ to contact you at all. Any such emails can be deleted without a second thought. The contents look good and the links work to bogus sites – not ‘EBay’ – they usually contain ‘bugs’ of various descriptions, all designed to get into your computer and feed back any useful information found on it. Want to see EBay’s latest offers, go to the EBay website much safer than opening the ‘offer you can not refuse’ email.

The scenario is very similar to ‘EBay’, again they look good and just like all scam emails they contain false links, sometimes phone numbers, impressive reproduced layout and a lot of ‘English’ spelling mistakes. (A fact many non-native ‘English’ speakers miss completely when responding to ‘scam’ emails.) Along with other poorly educated people, they happily answer all questions asked and lose thousands every day to these ‘Cyber-Criminals/Bullies’ - The same rule for PayPal special offers applies as well.

Phone numbers that are not
It is possible to buy phone numbers for other countries and many do this for genuine legally accepted reasons. Just because it is a ‘UK’or 'USA' etc number to ring, does not mean your call (along with the bogus contact name) is going to that country. Invariably the call never does, answered in a completely different country to the one dialled on your phone. In the event that you find such a number in an email, there is a very high chance that is an attempt to reassure that the email is genuine.

Lottery winner
Bin them! Do not waste a second opening them, each one is aimed at making you a lot poorer and the ‘Cyber-Bully/ Criminal’ a lot richer. You have not won anything at all. Your lottery winnings are false, every lottery has a ticket with ‘Your’ chosen numbers on it that will be in your possession, not faceless individual, – Foreign lotteries; do not normally sell outside their own national borders. Again badly written ‘English’ gets thousands of greedy individuals to empty their bank accounts chasing the mythical money they have not won, not only not won – The winnings never exist at all! – If the email were on paper, the paper would be worth more than the contents written on it.

Inheritance emails
Again bin them without opening them, the wording in the mailbox as to ‘From’ and ‘Header’ contents usually give them away first, if any is present in the header that is. As with any unknown names if in doubt – ‘Delete’ without opening. The header usually wants you to contact someone; this someone has a false name and phone number and is only intent on passing you along a chain of fraudsters getting you to part with as much money as possible on the way. Later after a few months respite they get in touch with you again and go through the whole rip-off process again. Think about this: ‘Why they do not know your name if you are actually inheriting such a large sum of money?’

Microsoft Junk emails
Microsoft do not, repeat do not send junk emails, nowadays nearly all Microsoft emails are by subscription only, only sent by request. You can happily delete any you have not asked them to send, as they will not be from Microsoft at all.

Password request / Locked account emails
If your mate across the street, a stranger in the bar where you have a beer, or a bus passenger asked for your password, bank details etc, would you give them to them. No! So why do people happily do so to an unknown plausible electronic enquiry? These details are yours and yours alone not for Jo/ Joe Public – Keep them safe!

If a stranger asked you for your ‘Front Door Key’ would you give it to them?


Passwords
Use a clue to remind you, never write the password down just write the clue down. Anyone can find it in your absence or even in front of you without you knowing.

Incidentally, forget any ideas of using big words from dictionaries or any other dictionary word unless disguised - Once access is gained to your computer from an illegal source, in nearly all cases, an incredible amount of dictionaries come into action as your data is trawled looking for passwords that you may have stored on it.

A far more secure combination today is around 16 characters/symbols long.

I say 'far more', owing to the fact that a 'Secret' is only a 'Secret' until you tell one other person. - So keep those passwords 'SECRET'

Use different on each website
In the event you have so many website passwords, then try to group your site passwords so that in the event that if a password is found, the password will not give access to all of the websites that you use, just a few. If there are several passwords on one site make sure that every password is different, adding a figure at the end of the main password is not a good idea.

Change passwords each month
Regularly change your passwords; it is in your own interest to do so and prior to this if you suspect someone else may know a password. A second option exists; if you do not use particular websites regularly, use the sites password reminder service, yes it takes a few minutes of your time but is well worth the effort involved.

Passwords...
Never share them - Never email them - Ignore requests for them


The passwords that you use to access ‘Chat’, ‘Windows’, your various accounts etc are yours and ‘Unique’ to you! No one else needs or needs to know them, not even the company website that you use, only their computers do. In every case, individuals are ‘locked out’ from this information and no one has any right to ask you for it. Electronic reminders are just that, no human is involved in the reminder at all.

Many systems do not send it; they send a temporary replacement instead, so that you can re-access your account. (A step that stops interception of the email whilst in transit to you)

Yes, there are even 'Spy-Bots' that read the body (Main Part) of your email content in transit looking for email addresses and nothing else, so try to disguise any email addresses you send to others - Doing this, actually makes them invisible to these 'Spy-Bots' - Example... donald(dot)duck(at)quackers(dot)com(dot)au

Email addresses that you enter in the 'Header' of your email are quite safe from illegal interception these 'Spy-Bot' Internet Nasties.

Naughty Websites...
All are lockable by you! Every ‘web site’ is lockable from your browser, just as every unwanted ‘email’ or ‘chat individual’ may be locked on the relevant provider. All responsible parents on every computer in the home should take these actions, before any problems start in the future.

That token fee of 1 Euro / $1 / £1 etc is more than just a means of verifying the users age, in many cases it is a ‘Yippee’ another sucker has given us permission to go on a spending spree at their expense. Result; loads of extra expenses many will go un-noticed by you as the Credit Card is usually paid by Direct Debit, with no questions asked by the Card owner at all. Tracker cookies are now safely implanted on your computer from this transaction.

Cookies...
Cookies are useful aids that enable regularly visited websites to open faster. Unfortunately, there are also ‘malicious’ cookies; these tend to turn up in emails and some downloaded programs as well. Employing the email precautions above will help reduce them, as will regular virus and spyware scans and updates of said programs. Another precaution you can take is to ‘Save’ rather than ‘Run’ a new program that you download, this will enable you virus and spyware programs to scan and remove any problems before they get the chance to ‘hide in your computers registry. Many new ‘Bugs’ self-duplicate, meaning you will get it back within seconds of removal as its clone left behind elsewhere in the registry reproduces itself.

Key-loggers sit there on your hard drive recording every keystroke and mouse click that you make. Then your computer sends this information to another (Unknown to you at all) computer in ‘Cyber-World’.

Conclusion...
At the time of writing, There are sadly still several thousand missing children in the world related to ‘chat’ and other instant message issues. There were a little over 4,100 recognised frauds in progress and a list of over 400 recognised Internet Fraudsters at large, with 420,000+ frauds deleted from the Internet. Together with a large number of hi-jacked, IP addresses by unknown parties. With your help in adopting as many of the above advice items, larger numbers of Internet crimes will be solved and the perpetrators caught and punished. Even better still thousands of children will be re-united unharmed with their families and the ‘groomers’ will not be able to lead many more astray in the future.

Another point not yet clarified as ‘a fact’ is ‘chat’ systems being used as an extension to street and playground bullying, to incite violence or crime on the victim against other victims, keeping the ‘actual’ aggressor/ perpetrator safe and sound.

URL Help websites to note:

  1. Internet fraud - http://www.fraudwatchinternational.com/
  2. Child web safety - http://www.thinkuknow.co.uk/
  3. Internet Police UK - http://www.wiredsafety.org/gb/law/uk_police_information.html
  4. FBI Cybercrime - http://www.fbi.gov/cyberinvest/cyberhome.htm


There are many more, most countries have them, in some form. Your first priority should be to contact your local Police in the event of personal issues and missing persons, they can help far quicker and will take all the necessary steps needed both where you are and contact more specialised units/ teams as needed.

Please enjoy the Internet it has a wealth of information on it and the vast majority of users are genuine, the minority spoil things in the ‘Cyber-World’, as well as the ‘Real World’.
Learn to be safe not sorry, together we can stamp out ‘Cyber-Crime’ - ‘Cyber-Bullying’ and develop a much safer ‘Cyber-World’

In case you ever wondered, there is a last page on the Internet, its URL is… http://www.shibumi.org/eoti.htm

Enjoy your life and help others to enjoy theirs, together we can make this borderless Internet safer, together Internet crime will be reduced. Everyday people like me are working behind the scenes to give you a better safer Internet, everyday the Internet gets a bit safer for all. With your help, we can all be winners and stop the minority from running our lives, fuelling our fears and feeding our limited knowledge to blame those who are not guilty in any way for the minorities actions against us all.


Part 3 follows tomorrow - Extra anytime tips whilst out and going about your daily life.

Internet Safety Tips - Part 1

Internet Safety – ‘Cyber-Bullying’ is ‘Beatable’

By Dr. Peter James – Independent researcher, writer, and web tactician.

Introduction

I shall be covering five topics in this article, all are interlinked, and all are forms of ‘Cyber-Bullying’. Just because you do not see your aggressor, face-to-face does not diminish the impact they can have on a victim or victims as an ‘Invisible’ perpetrator. No one is exempt from the tactics used by the ‘Cyber-Bullies’, young or old, experienced or not in the ways of the Internet. Everyone is a target, only experience, shared and then applied information, observations passed to the correct authoritative parties and applied diligence by each of us that use the Internet, can finally slow, halt, stop and then begin to reverse this trend, that is seemingly out of control but this is not so.

It is not my intention to preach to the converted, or suggest tips to experts in the computer field, rather brass tack information that is easily applied by most people. Rattle a few sleepy brain cells that may have dozed off into checking your ‘Current’ settings are still securely set after a series of updates etc. The bulk of the suggestions here do not need any programming skills at all, just a bit of common sense.

Everyday a constant battle waging against such people, everyday perpetrators are caught, everyday new methods to avoid detection are created, and everyday methods to avoid detection are destroyed, blocked from ever being used again by them.

This Battle goes on behind the scenes; the perpetrators do not carry a sign saying, “Hey, I’m an Internet Bully”. Likewise, those hunting them do not carry a sign saying, “I hunt Internet Criminals”. No, it is a cloak and dagger business. As an ordinary user of the Internet, you play a key role in this daily battle. Simply by applying some of the advice given below to your web activity will help to make the Internet safer and harder for the ‘Cyber-Bullies’ to achieve their goals, easier for the Internet crime fighters to catch the offenders.

One of the biggest sources of information to the ‘Cyber-Bully/ Criminal’ is your ‘Hard drive’ yes, the one you got rid of when you trashed your old computer. The one you threw in the rubbish when you upgraded to a bigger one. The one you sold so that you could afford the brand new super-duper better computer that could do everything but make a cup-of-tea.

Okay you wiped it / formatted it / clever you! Rather a case of ‘Stupid you’, (thats how the 'Cyber-Criminals' will see you) every hard drive contains a range of personal information on it, from the cat’s birthday to Aunt Edna’s home address, from your email address book to your personal Bank details, all useful information to the ‘Cyber-Criminal’.

All Data is recoverable by software you can only dream about, guess who has it?

That is right you guessed correctly. Passing on your old hard drive also allows the illegal copying of legal ‘Operating Systems’. As each illegal copy comes to the attention of Microsoft’, they are locked + the original copy as well from any further updates. (An illegal program generally has too many non-combination check numbers in it) This is not a ‘make money’ move it is a ‘make safer’ the Internet move, all pirate software has flaws that allow bugs, viruses etc onto the offending computer far easier than a ‘legal’ up to date secure ‘Operating System’ does.

  • Do not sell on your computer with the hard drive in it.
  • Do not trash your old computer + hard drive at the local dump.
  • Do not leave it out + hard drive for the bin men.
  • Do not pass it on + hard drive as a present to someone else.
  • Do not sell add on hard drives or give away etc for the same reasons.
  • Do remove your hard drive and store in a safe place.
  • Do destroy your hard drive if no longer needed by you.

How to destroy the old hard drive

With a hammer, or drill some holes in the hard drive, even embed it in concrete, or lose it in the Sea. Nothing else will effectively destroy the hard drive or any of the contents on it.

In each case make sure you (and others) are safe from flying particles whilst destroying the hard drive.

Every hard drive removed by the rightful owner is one less the ‘Cyber-Criminal’ can buy in bulk; literally, container loads of old computers are regularly purchased to further their activities. The hard drive you got rid of last week could be ripping of umpteen friends and Aunt Edna in a week or so from now.
The method being used to do so was on ‘Your old hard drive!’

It is possible nowadays for you to recieve 'Spam Emails' from yourself!

Email addresses gleaned from old hard drives often contain, not only your old email addresses but also those of friends you are possibly not in contact with today.

Try not to close an account with a website, by just changing your address and opening a new account on the same website (because you forgot your password for example).

Your recorded CDs etc with data, personal details on etc, should be shredded or at the very least scratched very heavily to destroy the readability of the CD for exactly the same reasons.

Email Precautions

You have not won anything...
One of the Cyber-Criminals favourite bullying tactics is the ‘Lottery’ prize awards. ‘Microsoft’ do not run lotteries at all, National Lotteries of various countries etc rarely if ever run such events to online persons, the chance of winning is way below ‘Zero’. All emails are designed to fool you, ‘Bogus’ Telephone numbers routed to another country, Plausible false names, along with extremely bad English are all methods used to fool the ‘fools’ amongst us.

Do not open it ‘ever’ check it has not been ‘spammed’ by mistake from a genuine sender by reading the header only. In the event that this is not the case then delete straight away, (More reasons for this are further on in this article).

Do not use your name as an email...
Unless you absolutely have to, never use your real name in an email address, no ordinary email user needs to do this. By using your ‘Real Name’, you supply all sorts of traceable help to ‘Cyber-Bullies’. Failing to use your real name on the web was frowned upon a while back, now it is becoming a necessary step to protect ones self from Identity theft, the higher your web profile the more chance of being a victim of the ‘Cyber-Nastiness’ on the Internet.

You email address is yours...
Email allows you to send mail to everyone at the click of the mouse; the click sends everyone the entire list of recipients as well. Meaning that everyone gets to know ‘so-and-so’s’ email address, that they did not know before or your best friend did not want known in the first place, silly you! Next time you send a blanket email, use the BCC facility, then your friends, associates or family will not get everyone’s address just yours and their own. You do not share your home phone number or home address with everyone you do not know. So why do you believe you have the right to share everyone’s email address without the owner’s permission?

Never open unknown received mail...
Just because an email has not gone into the ‘Spam’ file does not mean it is safe, if in doubt do not open it, instead instantly delete it. In the seconds it takes to open it, a ‘Trojan’, ‘Virus’ or ‘Key logger’ can become active, trawling your address book and hard drive passing itself on invisibly to other people you know or do not know. Doing the same to their computer as the ‘Bug’ is doing to your computer now. The latter will sit there on your hard drive recording and sending information to an unknown to you at all computers somewhere else in ‘Cyber-World’

Never open unknown received attachments...
The reason above also applies. In the second it takes to open it, a ‘Trojan’ or ‘Virus’ can be active, trawling your address book and hard drive passing itself on invisibly to other people you know. Some viruses sit for months like time bombs before becoming active, making them hard to locate or trace back to source.

Some attachments actually have false headings and or '*.---' endings to file names.
The attachment may indicate that aphotgraph is attached, chances are (if you are not expecting one and the email is from someone you do not know)it actually contains a virus of some kind ready to spread onto your computer.

Always use reputable valid and up to date ‘Anti-Virus’ and ‘Spyware’ programs and also ‘Legal’ computer ‘Operating Systems’ and ‘Software’ programs – the crucial bits missing from pirate software, make it much easier for others to get into your computer from the other side of the world (or even next door!).

Chat programs...
Each ‘Chat’ program has the facility to record onto your hard drive every typed word and most pictures (or references) and emoticons used by both parties. Please do activate it and keep a copy of every chat (Parents, activate it and store everyone’s chats in your own partition, for everyone’s peace of mind. Trusting your siblings is one thing, making sure they are safe is another). Would you let them have a total stranger in your home? This is what you are doing now. The chat record could be very useful if a loved one ever goes missing for no apparent reason, it may help find them faster and in a healthy condition again.

The stranger you are going to meet, you know the one you let into your home and life everyday, sometimes several times a day, the one who has not shared a true photograph of themselves. Told you little about them apart from what you wanted to know, possibly later than direct a response to your questions.

Please take these wise steps before going to meet them for the first few times.
  1. Take a friend with you, or arrange to meet them later at said place.
  2. Ring a friend regularly to let them know you are all right (this can be coded if you wish)
  3. Never txt anyone as there is no proof it is ‘You’ sending the txt message.
  4. If you do not take a friend with you, arrange a time to meet and place (preferably a public one) before leaving home and do not leave this chosen spot no matter how much your ‘New friend’ wants you to.
  5. Remember! Your teenage friend could so easily be someone much older.
  6. If everything is ok, great, have a good time but remember to follow the safety rules above.

Habits of chatter...
We all have a limited command of our own language and each language has a limited number of ways to use a particular phrase. By reading a chat message, it is possible to see something that you do not know or understand, just as if you are listening to someone speaking. Just as you would ask ‘what do you mean’ verbally, you can do the same in a chat message as well. In the event that you do not understand the response, or it seems to indicate an ‘exciting’ do this answer, be careful it may not be someone in your own age group or someone who can be trusted. Parents, if your sibling starts talking in words above their own natural ability to date, or showing an interest in something far too old for them, listen and take note, flying off the handle too quickly could easily push this issue away and become a secret to be kept from you. A sudden change in vocabulary may be a sign of an interaction outside siblings known friend and adult associations. It is much better to observe, listen, and discuss than to ‘shut the stable door’ after the horse has bolted.

Watch for grooming...
All the clues to this are visible in changes in a persons behaviour, be they young or old, taking on ‘new’ words wanting to do ‘this’ or ‘that’. Dress code may change as well, when you hear words like – ‘so-and-so’ does this… ‘Does that’ or ‘I want…? Etc’ the selling pitch is like an advert to millions on TV, except here it is aimed at a perceptively na├»ve youngster. The fact they are starting to trust and believe an ‘Invisible’ electronic friend more than someone in the ‘Real’ world is another subject, nevertheless just as big a problem.

Habits...
Very similar in many ways to the above paragraph and very closely associated to ‘normal’ everyday life. Changes in behaviour may slip in and free usage of names etc easily linked to friends, films or TV and ‘natural’ growing up, quite possibly the same as known ‘for real’ go un-noticed as similes’ with net activity and ‘real’ friends are not usually noticed in many cases. Some habit changes may go un-noticed at first, accepted as just a part of growing-up.

I can't tell you, its a secret...
We all like to have and keep secrets from others, with the intention of dishing out a surprise ‘gift’ or ‘treat’ at the appropriate time. The secrets I refer to are neither of these, rather the secrets laid in by ‘devious’ manipulation of a youngsters mind. These secrets may become evident due to a ‘slip-of-the-tongue’, do not press for an answer, instead wait patiently and introduce it another way. A one parent firing squad is ‘out’ bring the matter up gently as if a ‘secret of yours as a teenager’ for example may be a way to dig it out, if you know your sibling well, this will not pose a problem. However, in the event that you are too busy with your own life… No matter how little you know your child, you will be aware of habits, care or not you will have noticed changes taking place.

Habit changes are noticeable in many ways, but not as easy if the youngster is a loner or has only a few friends. Eating habits could be a clue here, suddenly loving peas or carrots for example, or, not eating fruit, maybe wanting a curry every day. Over many centuries, foodstuffs have been a weapon used against others in many ways; this is simply a variation on a theme, wishing to cook or lay the table could be links, or are they? ‘One Swallow does not make a summer’

Playing detective...
This is where you can learn to use your memory, linking the above four entries together, may provide many clues to who your siblings’ ‘Mystery person’ is. Habits, clothing, and food are some, along with films, music, or TV Heroes. The liking of black things is a phase most youngsters go through, this may not be a help. However it is a clue, just as for example ‘Strawberries’ are suddenly a favourite dish whereas they did not like them till recently, could be the clue needed to enable the authorities to catch an offender and return a loved one back to the family fold safe and sound.

Photographs...
Posted photographs and shared photographs may not be the person or persons in them at all. In several cases where a youngster has gone to meet the ‘new friend’ for the first time, the ‘new friend’ has turned out to be a lot older than photographs posted on chat etc, sometimes the excuse given is that ‘so-and-so’ is doing… ‘So I have come to meet you in their place and will take you to meet them ‘X’ asked me to apologise for not being here.’ (Or words similar to this example)

Lack of photographs...
Why? Maybe they are new to ‘chat’. In the event a picture never appears after talking them through the methods or you have doubts, end the ‘electronic’ relationship, it is better to be safe than sorry at the end of the day.

Does the other person on chat have a software problem? Is the chat set up correctly, is a webcam actually attached, settings may show one is present but actually is not. Which ever applies it does not matter who it is at the other end, never put on a ‘floor show’ for the other person. Especially if you never see them at all on their webcam, or accept invitations to do so by unknown parties, you never know who could be watching. Many children are tempted this way by ‘groomers’. Near enough, every webcam has a USB, remove, and lock it away when not needed or record its activity in your partition most can be. This is another variation on the ‘safe than sorry’ rule.

Any noted suspicions are worth noting down, any clues are worth remembering, and be it an observation of yours, a friend, or even a sibling. In the event of something going horribly wrong, then a clue like so-and-so likes / dislikes ‘tomato’s’ could be the very clue needed to apprehend and get a loved one returned safely home. Literally any suspicions should be reported to the correct authorities, let them decide it is their job not yours.

URL Help websites to note:
  1. Internet fraud - http://www.fraudwatchinternational.com/
  2. Child web safety - http://www.thinkuknow.co.uk/
  3. Internet Police UK - http://www.wiredsafety.org/gb/law/uk_police_information.html
  4. FBI Cybercrime - http://www.fbi.gov/cyberinvest/cyberhome.htm

In Part 2 tomorrow...

Fraud Email - Phone numbers - Lottery winner - Inheritance - Microsoft Junk
Password request / Locked account emails - Password safety tips
Deposits - Naughty Websites - Cookies - Conclusion

Wednesday, December 16, 2009

Crazy Cartoons - V - Computer Game Violence

Ok, 'Bugs Bunny' is a bit violent I know...

http://youtube.com/watch?v=WM5Gwzk3Vfc

But Elmar Thudd and other cartoon baddies in it are always back to themselves in a matter of seconds to have another go at catching 'Bugs'

'Tom & Jerry' are not much different on the violence stakes either... http://youtube.com/watch?v=iG5Px3A0u0w

All sorts of horrible things happen to 'Tom' every episode, he's always better within seconds as well.

Poor old 'Wile E Coyote' forever chasing 'Roadrunner', he is technically killed at least 6 if not more times an episode...

http://youtube.com/watch?v=bgsFVqfu-rM

But he really does catch 'Roadrunner' in the end believe it or not, even though it takes years of episodes to do so...

http://youtube.com/watch?v=KJJW7EF5aVk


Which brings me to my frustration...

Why, after 65 odd years of being treated to death and destruction on a regular episodic basis are such animated cartoons cited as inducing violence and inciting said in the so called 'youth' today? .

Yet these cartoons can only be seen on 'YouTube' and the likes in so many Country's now. Yet Computer Games, where you have to deliberately 'Steal', 'Kill', 'Rob' , 'Maim' , 'Blow Up', is one allowed to do these and other such despicable acts to others, sometimes while 'Playing' against others on networked 'Games'. Carry on being allowed and called harmless?

The former mentioned cartoons did not do so, or boost the crime figures through the ceiling, or produce 'Copy Cat' violence etc on 'Real People' as the degenerates of today do, totally unable to unplug their minds from illusion at the right time, believing they can live as the 'Games' teach them, as they unleran reality and learn anti-social skills by 'Playing' and 'Living these games. Society loses heavily. Crime goes up, Fear of todays youth goes up, Trust in said plummets and society loses out 'Big-Time'. So what is the difference between the two items?

Answer is 'Money', loads of it! There is far more generated income from violent computer games in the form of taxes for Governments and Profits for companies than in the 65 year old cartoons. Sod the individual, 'Fill the nations coffers' with blood money please, we make more for wasting than the cost of damage done by them, money first, individuals last, greed is far more important, besides it makes it easier to control the masses if we let the degenerates bully, frighten and scare the decent people into being mice, makes it easier all round and ensures job security for the 'Boy's as well'. Who cares if the youth of today play these games all the time, then get the fixation in their tiny minds that it isn't a game, that it is really reality.

The powers that be don't care, so perhaps we should!

Answers on a postcard (or email) please.

A, B, Catch you later dear reader.

Tuesday, December 1, 2009

The Past Has Gone... Its Still Here Today

Today is 'Revolution Day' here in Romania

Take a look around you today, tomorrow and the next day etc, etc, etc

Life goes on for us all, or does it?

For so many it stopped years ago and now these people (Humans just like you and me, dear reader) they simply exist! Victims of Ignorance. Victims of Bullies. Victims of Regimes. Victims of Greed. Victims of Hate. Victims who don't know when to stop persecuting those around them today, who have done them no harm at all. Victims of the victims, who are being taught to be scared of something that is no longer present, but will be by instilling the fear into them today. Victims who take solace by picking on victims.

Unfortunately this list is endless and also unfortunately there are always those who will take advantage.

(Making the victims pay yet again and again for something they had no control over)

Manipulating others for their own ends, growing richer and unhappier from the suffering of others, they can't spend all their ill-gotten gains, they certainly can't take it to the next world with them!

(Unless they have a very large 'Asbestos Suitcase')

By exasperating the victims misfortunes, the greed and manipulation of said, is certain to continue, no question about it at all.

Are they such narrow minded individuals that they fail to see that they and every victim could all gain and profit far more from pulling/working together?

The policy of making the most out of 'Hero Worship' of the 'Forces of Darkness' will stop one day, just as the 'Regime' here ended in 1989, but still lives on in the victims as if it was yesterday, as fresh today due to those who blatantly took and take advantage of the suffering inflicted in the darkest days, lets see a growing end towards the 'Storm Ripples' that still spread across this pond of nearly humanity!

Within a year, many had gone back to living their lives as if those who had been overthrown and those ousted from the country were still present - Many still live like this today 20 years later, many of whom will only see real freedom when they die (hopefully of natural causes) after growing up under Nazi Occupation, Russian Occupation, and Communist Kremlin 'Puppets'

True many were punished for their actions inflicted on the population here. However, many who got away with it, still rule the roost today - How? By putting on a different hat and changing their job and also job description just enough to make it look good.

One odd twist that took place here is this...

Whilst under the occupation of the Russians, foreign travel was allowed - On the condition that you left one family member behind to make sure you returned by the date set.

Today, thousands have left Romania to live and work abroad - Many of these people have left behind one family member, in this case of their own free will to ensure they 'Can' come back at a later date.

This may sound crazy to westerners who have never lived a lifetime in a country occupied by a foreign power, or under any form of oppressive regime - Its almost as if the whole country is simply going through the motions of living life today, keeping the country in 'Mothballs' till the occupying forces return at a currently unknown date.

Pretending that everything is fine, far from it the graveyards are stilling filling up with people who never knew freedom and will carry on doing so for many years to come. The skills they learnt to survive are still being handed down. The families in power then are still in power today, despite the different hat that is worn today.

There is I am glad to say a growing (slowly though) percentage of the population who are keen to move into the 21st century, at least they have reached double figures now percentage wise.

No, this is not simply a problem here, it is all over, everywhere people are who are affected by people who take great joy in causing mental and physical pain on others and taking advantage of this pain and suffering afterwards. Be it 'Nation against Nation', or individual against individual.