Internet Safety – ‘Cyber-Bullying’ is ‘Beatable’
By Dr. Peter James – Independent researcher, writer, and web tactician.
Introduction
I shall be covering five topics in this article, all are interlinked, and all are forms of ‘Cyber-Bullying’. Just because you do not see your aggressor, face-to-face does not diminish the impact they can have on a victim or victims as an ‘Invisible’ perpetrator. No one is exempt from the tactics used by the ‘Cyber-Bullies’, young or old, experienced or not in the ways of the Internet. Everyone is a target, only experience, shared and then applied information, observations passed to the correct authoritative parties and applied diligence by each of us that use the Internet, can finally slow, halt, stop and then begin to reverse this trend, that is seemingly out of control but this is not so.
It is not my intention to preach to the converted, or suggest tips to experts in the computer field, rather brass tack information that is easily applied by most people. Rattle a few sleepy brain cells that may have dozed off into checking your ‘Current’ settings are still securely set after a series of updates etc. The bulk of the suggestions here do not need any programming skills at all, just a bit of common sense.
Everyday a constant battle waging against such people, everyday perpetrators are caught, everyday new methods to avoid detection are created, and everyday methods to avoid detection are destroyed, blocked from ever being used again by them.
This Battle goes on behind the scenes; the perpetrators do not carry a sign saying, “Hey, I’m an Internet Bully”. Likewise, those hunting them do not carry a sign saying, “I hunt Internet Criminals”. No, it is a cloak and dagger business. As an ordinary user of the Internet, you play a key role in this daily battle. Simply by applying some of the advice given below to your web activity will help to make the Internet safer and harder for the ‘Cyber-Bullies’ to achieve their goals, easier for the Internet crime fighters to catch the offenders.
One of the biggest sources of information to the ‘Cyber-Bully/ Criminal’ is your ‘Hard drive’ yes, the one you got rid of when you trashed your old computer. The one you threw in the rubbish when you upgraded to a bigger one. The one you sold so that you could afford the brand new super-duper better computer that could do everything but make a cup-of-tea.
Okay you wiped it / formatted it / clever you! Rather a case of ‘Stupid you’, (thats how the 'Cyber-Criminals' will see you) every hard drive contains a range of personal information on it, from the cat’s birthday to Aunt Edna’s home address, from your email address book to your personal Bank details, all useful information to the ‘Cyber-Criminal’.
All Data is recoverable by software you can only dream about, guess who has it?
That is right you guessed correctly. Passing on your old hard drive also allows the illegal copying of legal ‘Operating Systems’. As each illegal copy comes to the attention of Microsoft’, they are locked + the original copy as well from any further updates. (An illegal program generally has too many non-combination check numbers in it) This is not a ‘make money’ move it is a ‘make safer’ the Internet move, all pirate software has flaws that allow bugs, viruses etc onto the offending computer far easier than a ‘legal’ up to date secure ‘Operating System’ does.
- Do not sell on your computer with the hard drive in it.
- Do not trash your old computer + hard drive at the local dump.
- Do not leave it out + hard drive for the bin men.
- Do not pass it on + hard drive as a present to someone else.
- Do not sell add on hard drives or give away etc for the same reasons.
- Do remove your hard drive and store in a safe place.
- Do destroy your hard drive if no longer needed by you.
How to destroy the old hard drive
With a hammer, or drill some holes in the hard drive, even embed it in concrete, or lose it in the Sea. Nothing else will effectively destroy the hard drive or any of the contents on it.
In each case make sure you (and others) are safe from flying particles whilst destroying the hard drive.
Every hard drive removed by the rightful owner is one less the ‘Cyber-Criminal’ can buy in bulk; literally, container loads of old computers are regularly purchased to further their activities. The hard drive you got rid of last week could be ripping of umpteen friends and Aunt Edna in a week or so from now.
The method being used to do so was on ‘Your old hard drive!’
It is possible nowadays for you to recieve 'Spam Emails' from yourself!
Email addresses gleaned from old hard drives often contain, not only your old email addresses but also those of friends you are possibly not in contact with today.
Try not to close an account with a website, by just changing your address and opening a new account on the same website (because you forgot your password for example).
Your recorded CDs etc with data, personal details on etc, should be shredded or at the very least scratched very heavily to destroy the readability of the CD for exactly the same reasons.
Email Precautions
You have not won anything...
One of the Cyber-Criminals favourite bullying tactics is the ‘Lottery’ prize awards. ‘Microsoft’ do not run lotteries at all, National Lotteries of various countries etc rarely if ever run such events to online persons, the chance of winning is way below ‘Zero’. All emails are designed to fool you, ‘Bogus’ Telephone numbers routed to another country, Plausible false names, along with extremely bad English are all methods used to fool the ‘fools’ amongst us.
Do not open it ‘ever’ check it has not been ‘spammed’ by mistake from a genuine sender by reading the header only. In the event that this is not the case then delete straight away, (More reasons for this are further on in this article).
Do not use your name as an email...
Unless you absolutely have to, never use your real name in an email address, no ordinary email user needs to do this. By using your ‘Real Name’, you supply all sorts of traceable help to ‘Cyber-Bullies’. Failing to use your real name on the web was frowned upon a while back, now it is becoming a necessary step to protect ones self from Identity theft, the higher your web profile the more chance of being a victim of the ‘Cyber-Nastiness’ on the Internet.
You email address is yours...
Email allows you to send mail to everyone at the click of the mouse; the click sends everyone the entire list of recipients as well. Meaning that everyone gets to know ‘so-and-so’s’ email address, that they did not know before or your best friend did not want known in the first place, silly you! Next time you send a blanket email, use the BCC facility, then your friends, associates or family will not get everyone’s address just yours and their own. You do not share your home phone number or home address with everyone you do not know. So why do you believe you have the right to share everyone’s email address without the owner’s permission?
Never open unknown received mail...
Just because an email has not gone into the ‘Spam’ file does not mean it is safe, if in doubt do not open it, instead instantly delete it. In the seconds it takes to open it, a ‘Trojan’, ‘Virus’ or ‘Key logger’ can become active, trawling your address book and hard drive passing itself on invisibly to other people you know or do not know. Doing the same to their computer as the ‘Bug’ is doing to your computer now. The latter will sit there on your hard drive recording and sending information to an unknown to you at all computers somewhere else in ‘Cyber-World’
Never open unknown received attachments...
The reason above also applies. In the second it takes to open it, a ‘Trojan’ or ‘Virus’ can be active, trawling your address book and hard drive passing itself on invisibly to other people you know. Some viruses sit for months like time bombs before becoming active, making them hard to locate or trace back to source.
Some attachments actually have false headings and or '*.---' endings to file names.
The attachment may indicate that aphotgraph is attached, chances are (if you are not expecting one and the email is from someone you do not know)it actually contains a virus of some kind ready to spread onto your computer.
Always use reputable valid and up to date ‘Anti-Virus’ and ‘Spyware’ programs and also ‘Legal’ computer ‘Operating Systems’ and ‘Software’ programs – the crucial bits missing from pirate software, make it much easier for others to get into your computer from the other side of the world (or even next door!).
Chat programs...
Each ‘Chat’ program has the facility to record onto your hard drive every typed word and most pictures (or references) and emoticons used by both parties. Please do activate it and keep a copy of every chat (Parents, activate it and store everyone’s chats in your own partition, for everyone’s peace of mind. Trusting your siblings is one thing, making sure they are safe is another). Would you let them have a total stranger in your home? This is what you are doing now. The chat record could be very useful if a loved one ever goes missing for no apparent reason, it may help find them faster and in a healthy condition again.
The stranger you are going to meet, you know the one you let into your home and life everyday, sometimes several times a day, the one who has not shared a true photograph of themselves. Told you little about them apart from what you wanted to know, possibly later than direct a response to your questions.
Please take these wise steps before going to meet them for the first few times.
- Take a friend with you, or arrange to meet them later at said place.
- Ring a friend regularly to let them know you are all right (this can be coded if you wish)
- Never txt anyone as there is no proof it is ‘You’ sending the txt message.
- If you do not take a friend with you, arrange a time to meet and place (preferably a public one) before leaving home and do not leave this chosen spot no matter how much your ‘New friend’ wants you to.
- Remember! Your teenage friend could so easily be someone much older.
- If everything is ok, great, have a good time but remember to follow the safety rules above.
Habits of chatter...
We all have a limited command of our own language and each language has a limited number of ways to use a particular phrase. By reading a chat message, it is possible to see something that you do not know or understand, just as if you are listening to someone speaking. Just as you would ask ‘what do you mean’ verbally, you can do the same in a chat message as well. In the event that you do not understand the response, or it seems to indicate an ‘exciting’ do this answer, be careful it may not be someone in your own age group or someone who can be trusted. Parents, if your sibling starts talking in words above their own natural ability to date, or showing an interest in something far too old for them, listen and take note, flying off the handle too quickly could easily push this issue away and become a secret to be kept from you. A sudden change in vocabulary may be a sign of an interaction outside siblings known friend and adult associations. It is much better to observe, listen, and discuss than to ‘shut the stable door’ after the horse has bolted.
Watch for grooming...
All the clues to this are visible in changes in a persons behaviour, be they young or old, taking on ‘new’ words wanting to do ‘this’ or ‘that’. Dress code may change as well, when you hear words like – ‘so-and-so’ does this… ‘Does that’ or ‘I want…? Etc’ the selling pitch is like an advert to millions on TV, except here it is aimed at a perceptively naïve youngster. The fact they are starting to trust and believe an ‘Invisible’ electronic friend more than someone in the ‘Real’ world is another subject, nevertheless just as big a problem.
Habits...
Very similar in many ways to the above paragraph and very closely associated to ‘normal’ everyday life. Changes in behaviour may slip in and free usage of names etc easily linked to friends, films or TV and ‘natural’ growing up, quite possibly the same as known ‘for real’ go un-noticed as similes’ with net activity and ‘real’ friends are not usually noticed in many cases. Some habit changes may go un-noticed at first, accepted as just a part of growing-up.
I can't tell you, its a secret...
We all like to have and keep secrets from others, with the intention of dishing out a surprise ‘gift’ or ‘treat’ at the appropriate time. The secrets I refer to are neither of these, rather the secrets laid in by ‘devious’ manipulation of a youngsters mind. These secrets may become evident due to a ‘slip-of-the-tongue’, do not press for an answer, instead wait patiently and introduce it another way. A one parent firing squad is ‘out’ bring the matter up gently as if a ‘secret of yours as a teenager’ for example may be a way to dig it out, if you know your sibling well, this will not pose a problem. However, in the event that you are too busy with your own life… No matter how little you know your child, you will be aware of habits, care or not you will have noticed changes taking place.
Habit changes are noticeable in many ways, but not as easy if the youngster is a loner or has only a few friends. Eating habits could be a clue here, suddenly loving peas or carrots for example, or, not eating fruit, maybe wanting a curry every day. Over many centuries, foodstuffs have been a weapon used against others in many ways; this is simply a variation on a theme, wishing to cook or lay the table could be links, or are they? ‘One Swallow does not make a summer’
Playing detective...
This is where you can learn to use your memory, linking the above four entries together, may provide many clues to who your siblings’ ‘Mystery person’ is. Habits, clothing, and food are some, along with films, music, or TV Heroes. The liking of black things is a phase most youngsters go through, this may not be a help. However it is a clue, just as for example ‘Strawberries’ are suddenly a favourite dish whereas they did not like them till recently, could be the clue needed to enable the authorities to catch an offender and return a loved one back to the family fold safe and sound.
Photographs...
Posted photographs and shared photographs may not be the person or persons in them at all. In several cases where a youngster has gone to meet the ‘new friend’ for the first time, the ‘new friend’ has turned out to be a lot older than photographs posted on chat etc, sometimes the excuse given is that ‘so-and-so’ is doing… ‘So I have come to meet you in their place and will take you to meet them ‘X’ asked me to apologise for not being here.’ (Or words similar to this example)
Lack of photographs...
Why? Maybe they are new to ‘chat’. In the event a picture never appears after talking them through the methods or you have doubts, end the ‘electronic’ relationship, it is better to be safe than sorry at the end of the day.
Does the other person on chat have a software problem? Is the chat set up correctly, is a webcam actually attached, settings may show one is present but actually is not. Which ever applies it does not matter who it is at the other end, never put on a ‘floor show’ for the other person. Especially if you never see them at all on their webcam, or accept invitations to do so by unknown parties, you never know who could be watching. Many children are tempted this way by ‘groomers’. Near enough, every webcam has a USB, remove, and lock it away when not needed or record its activity in your partition most can be. This is another variation on the ‘safe than sorry’ rule.
Any noted suspicions are worth noting down, any clues are worth remembering, and be it an observation of yours, a friend, or even a sibling. In the event of something going horribly wrong, then a clue like so-and-so likes / dislikes ‘tomato’s’ could be the very clue needed to apprehend and get a loved one returned safely home. Literally any suspicions should be reported to the correct authorities, let them decide it is their job not yours.
URL Help websites to note:
- Internet fraud - http://www.fraudwatchinternational.com/
- Child web safety - http://www.thinkuknow.co.uk/
- Internet Police UK - http://www.wiredsafety.org/gb/law/uk_police_information.html
- FBI Cybercrime - http://www.fbi.gov/cyberinvest/cyberhome.htm
In Part 2 tomorrow...
Fraud Email - Phone numbers - Lottery winner - Inheritance - Microsoft Junk
Password request / Locked account emails - Password safety tips
Deposits - Naughty Websites - Cookies - Conclusion
Fraud Email - Phone numbers - Lottery winner - Inheritance - Microsoft Junk
Password request / Locked account emails - Password safety tips
Deposits - Naughty Websites - Cookies - Conclusion
1 comment:
Excellent suggestions, worthy of review by the most experienced users.
Post a Comment