24 Oct 2013

A little things change a life - about cyber stalker

           A LITTLE THINGS CHANGE A LIFE - ABOUT CYBER STALKER
                  Awareness and Prevention.

Computer crime refers to any crime that involves a computer  and a network. Recently I found myself preparing to speak on a panel related to domestic violence and the Internet.  As part of this presentation I researched the most common computer crimes related to cybers internet.  Obviously cyberstalking is the big one.   Here are some thoughts related to cyber stalking prevention and victim tips.  As always, this is not meant to be advice.
Although I’m writing about cyber stalking AWARENESS AND PREVENTION I’ll list some other ways to be safe as well.  Most stalking cases involve an ex-intimate so I focused on this type of stalker. Here we discuss some factors of cyberstalking or cybercrime.

Think like the CYBER STALKER.  How could someone who knows where you live, work, play, eat, sleep, where your friends and family live, where you go online, shop, keep may be some body track of you.
Please note if possible which email addresses, user names, Internet Service Provider, IP addresses and social networking sites your ex used in the past.  Keep a folder with all of the evidence of your ex’s unwanted contacts.  This could include screen captures of online activity, chat logs, text messages, emails including the email header,  and phone calls left on your voice-mail.  Always note the date and time as well and how the contact made you feel.

Pay attention to changes in your online accounts.  Has email been read that you did not read? Has someone tried to access you online accounts from a computer you do not recognize? Don’t be that person who friends everyone and their mother on social networking sites, no strangers including people you have never met in person. Your ex could pose as a stranger who has similar interests as you just to see who you are talking to and where you are at?.

This includes changing the door locks, removing all the hide a keys, change the alarm codes, tell your neighbors, coworkers, friends, online friends, and family about your situation and tell them to let you know if they see your ex around or hear from your ex.  Park your car in secure garages in view of the security cameras. Change your passwords to all accounts and consider changing your email addresses.  Wipe your hard drive with a free tool like DBAN and reinstall your operating system on your computer.  Change your cell phone account if you were sharing a plan with the former intimate.  Keep your social networking accounts as private as possible and use an alias instead of you real name.
I think any further contact could muddy your message.  WARNING, when the ex realizes the relationship is truly over this can become a very dangerous time for the victim.  Ex’s can transition from MONITORING THE SITUATION TO REVENGE.  Be prepared and aware.

Recognize the warning signs that your intimate has violence, control, or other issues that are going to make terminating the relationship difficult.  Frequently we miss the behavioral clues people display indicating their emotional state.  If there is history of violence or control prepare yourself for the worst.

Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the Internet.  Cyber Crimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as

Internet Chat rooms, emails, notice boards and groups and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking,  copyright infringement, child pornography, and child grooming.

There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Internationally, both governmental and non-state actors engage in cyber crimes, including espionage, financial theft and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court (ICC).

here...Alas Mrose...the original contents by www.sensualityface.com or www.fairyage.com / described & simplified with the help of The Dawn News International

Labels: ,

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home