Sunday, October 26, 2008

Recieved via email: Technology is becoming more and more a Predator's Paradise and Safe Haven

Technology is becoming more and more a Predator's Paradise and Safe Haven
Knowledge enables power and with it we
 Can Help Protect Ourselves and the Ones We Love
There are dozens of new methods and techniques being developed each day to enhance our technology.   The internet continues to be a tool that we rely on daily as well as a tool that enables predators to stalk, threaten and terrorize victims.  The majority of these victims being innocent children.
75 % or more local police departments are not even aware of half of the technology threats that exist. Yet these threats are easily accessible and available to offenders (as well as all members of the general public). This fact alone represents a significant danger. 
When the Officers who are in charge of our safeties are not aware of the threats/dangers/risks  that can harm our children as well as ourselves, how are we supposed to feel safe and protect ourselves and/or our families?
For the past two years, I've been a victim of many different forms of what I like to refer to as "technological terror". My ex husband is "computer savvy" .  I have made dozens of police reports to 10 plus police departments regarding threatening text messages, calls, emails, letters and the fact that my ex husband knew my whereabouts 24/7. 
I've reported his criminal actions to police departments in the states of NH,CT, CA, MA and FL.  The majority have informed me that they did not have the resources to trace emails or calls.  One Police Department in NH did not even know how to handle and/or investigate most of the threats my ex husband committed against me because his threats were (1) technology based and (2) their department did not have the knowledge/education/resources  on computer and/or technology based crimes.  Before this happened to me, I always had assumed that each police department was similiar to the next (minus the size/# of Police Officers)
 But what was I supposed to do?  They are the only resource my daughter and I have/had to obtain justice and safety.
 When it came to the day my ex finally was brought infront of the criminal court in NH for his crimes, the State had very little supporting evidence because of the reasons I have listed above and the State had to heavily rely on witness testimony.
As time went by and the threats grew more frequent and violent, I  was forced to spend money to hire private investigators and outside services in effort to obtain the answers and provide alternative methods to keep my daughter and myself safe. The unknown is not only confusing and frustrating, but it is beyond terrifying. Knowledge alone is power and can help provide a person comfort and/or safety.   
My question is why are law enforcement officials not required to stay up to date on the consistently increasing technological threats that jeopardize the safety and well being of our children and us????
A two hour seminar once per year or even a memo/ at a glance sheet that was faxed/mailed to each police department informing and updating officers on this subject would be a positive.  Just this alone would be 100 times better than what is in place now.
Police Officers lack of knowledge and/or ability  ends up causing distrust and anger factors to be formed by those they swore to protect and serve.
One of the reasons we pay taxes is to benefit from the safeties that our local state/city/town law enforcement agencies provide us and our families. It is not like the average citizen has access to the FBI or endless money to hire outside agencies to investigate crimes committed against them.  
Technological Threats such as key logger computer viruses, proxy servers, anonymous email services, throw away phones, 811.com/anonymous text messages services, spoof cards and other technology are  currently being used today by criminals to harm us.  The advancements are in this area are strengthening and enabling offenders to carry out their violent crimes more frequently and secretly.
 It is horrifying enough to be stalked/abused/victimized but what is worse is when there is technology that enables the abusers to hide from the law and get away with the crimes they've committed against you.
For example with the spoof card. You can put in any person's phone number .  You can select the change of voice option. 
Realistic Example:  The offender calls their selected victim( your child) and informs your child that it's " Officer Bob and that there's been an emergency with their mother". Officer Bob tells your child that he will have an officer in an unmarked police car pick them up at their house and take them to their mother.  Your child looks at the caller ID and see's their  town's police department phone # and name on the caller ID.  So what does your child do, they jump into the Perpetrator/Officer Bob's car when it arrives.  Why wouldn't they?  The police department's phone number came up on the caller ID and that alone is verification right.  Well sadly since the spoof card that is no longer the case.
What is Spoof Card?
Spoof Card offers the ability to change what someone sees on their caller ID display when they receive a phone call. Simply dial the toll free number and then your PIN. You'll then be prompted to enter the destination number followed by the phone number to appear on caller ID. It's that easy!
Is spoof card legal?
Yes. Each of the capabilities of Spoof Card is legal in the US. However, certain uses may be illegal depending on which state you are calling from  
What other features does Spoof Card offer?
You have the ability to change your voice to a Male or Female. If you do choose to change your voice, the person whom you call will hear your transformed voice in real-time. We also offer the option to record your conversation, which can later be retrieved by logging-in to the control panel or calling the toll-free access number from any phone. There is no extra cost for these features and they are included with your purchase.
Can calls be traced back to me?
Your financial, personal and call records are all confidential and are untraceable.
Can any number be used to show up on the Caller ID?
Any 10 digit number can be used. Not only will the number show up but also the Name registered for that number would automatically appear.
What number will show up on the phone bill of the person whom I call?
Whatever number you enter as the spoof number will show up on the bill of the person you called. They won't ever see your actual phone number! 
Spoof Card Services: Cost=$ 10.00-$ 29.00
Polygraph Phone Services: Cost=$10.00-$ 20.00
Anonymous Text Messaging Services: Cost=FREE
Text for free advertisement on their webpage below -http://textforfree.net
Here at Text For Free, we know that you are tired of paying text messaging fees. That's why you can now send free text messages to almost any USA cell phone provider. Its 100% free texting, with no catch! You can even prank your friends because we offer anonymous text messaging, which means that your friends will never know who sent them the text message! Text For Free offers spam free text messaging, meaning we will never send you unwanted text messages or share your cell number with anybody. What are you waiting for? Stop spending and start texting for free.
Key logger Computer Viruses/Program/Services: Cost= $ 0-$ 50
A key logger sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard. As a hardware device, a keylogger is a small battery-sized plug that serves as a connector between the user's keyboard and computer. Because the device resembles an ordinary keyboard plug, it is relatively easy for someone who wants to monitor a user's behavior to physically hide such a device "in plain sight." (It also helps that most workstation keyboards plug into the back of the computer.) As the user types, the device collects each keystroke and saves it as text in its own miniature hard drive. At a later point in time, the person who installed the key logger must return and physically remove the device in order to access the information the device has gathered.
A keylogger program does not require physical access to the user's computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a root kit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.
Although keylogger programs are promoted for benign purposes like allowing parents to monitor their children's whereabouts on the Internet, most privacy advocates agree that the potential for abuse is so great that legislation should be enacted to clearly make the unauthorized use of key loggers a criminal offense.
Disposable=Throw Away Phones: Cost = $ 10-$ 20
You pay cash for them at your local convenient store. During the phone set up you can enter in any name/information that you want
Anonymous Email Services:         Cost=Free
Usually, when you send an email it is neither private nor anonymous. Everybody can read it, and everybody can find out it was you who sent it. If you want or need to send an email message anonymously, there are several strategies you can employ, though. Find out how to send email in anonymity with these tips, tricks, instructions and how to.
Anonymous email's advertisement on their web page below -Free anonymous email and private email, private label email ...
Send free anonymous emails easily! If you're looking for your own private anonymous email account, you've found it a TheAnonymousEmail.com.
Proxy Servers: Cost= $ 0-$ 30
Proxy servers are good and bad because(1) you can protect your location but (2) so can offenders
In computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it would 'cache' the first request to the remote server, so it could save the information for later, and make everything as fast as possible.
A proxy server can be placed in the user's local computer or at various points between the user and the destination servers or the Internet.
The number of Registered sex offenders in the United States
(Note: This number only represents the individuals who were caught)= 664,731
The chart below represents the number of registered sex offenders per state
Alabama
10,177
Illinois
19,998
Missouri
7,152
Oregon
14,800
Wisconsin
20,359
Alaska
3,233
Indiana
9,722
Montana
14,586
Pennsylvania
9,698
Wyoming
2,542
Arizona
14,481
Iowa
5,178
Nebraska
2,814
Rhode Island
1,686
Arkansas
8,377
Kansas
6,391
Nevada
6,162
South Carolina
10,877
California
114,691
Kentucky
7,072
New Hampshire
3,970
South Dakota
5,178
Colorado
10,196
Louisiana
7,988
New Jersey
12,185
Tennessee
11,832
Connecticut
5,068
Maine
2,159
New Mexico
2,342
Texas
53,911
Delaware
3,528
Maryland
4,688
New York
27,192
Utah
6,431
Florida
49,419
Massachusetts
10,507
North Carolina
11,750
Vermont
2,486
Georgia
15,910
Michigan
44,228
North Dakota
1,175
Virginia
15,189
Hawaii
2,527
Minnesota
14,586
Ohio
18,098
Washington
20,133
Idaho
5,178
Mississippi
5,059
Oklahoma
10,420
West Virginia
2,821















Important Information for Parents to review: http://www.missingkids.com/en_US/publications/NC167.pdf
Tip to help you stay safe: Cost = FREE
The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA).
IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, local and international level, IC3 provides a central referral mechanism for complaints involving Internet related crimes.
Computer Spyware and/or Virus Programs to Help You Protect your Computer:
Don't forget you need both a spyware and virus program/protection software
Spy Sweeper is proprietary software sold by Webroot Software, which detects and removes spyware, and viruses (with optional Anti Virus component) on personal computers that run Microsoft Windows.
 www.webroot.com             Cost=$ 30
 (the only spy sweeper I have found that works against key loggers)
Trace Emails: Cost=Free
An Internet Protocol (IP) address is a numerical identification (logical address) that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its nodes.[1] Although IP addresses are stored as binary numbers, they are usually displayed in human-readable notations, such as 192.168.100.1 (for IPv4), and 2001:db8:0:1234:0:567:1:1 (for IPv6). The role of the IP address has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." [2]
In order to improve our safety and our children's safety, we need to let our State Representatives know how important it is that our local police departments and their officers are educated on Internet and Technology Base Crimes.  Do not assume your local police departments knows because I can tell from firsthand experience that MOST DON'T.
Positive Change can only come in numbers, education and our voices.
It is important to be pro active vs. reactive. It takes less than 10 minutes to send an email or place a letter in the mail to your local state representative to request that a law/policy is put into place, that requires police officers to stay educated on technological crimes.
It also takes less than 10 minutes to have your child abducted or for you and/or your child to become a victim of a violent crime.
CT State Representatives
Website:

CT Attorney General-Richard Blumenthal
Website:
55 Elm Street
Hartford, CT 06141-0120
Phone: 860-808-5318
FAX: 860-808-5387
Email
CT-  Governor Jodi Rell
Website:
State Capitol
210 Capitol Avenue
Hartford, CT 6106
Phone: 860-566-4840
Email:
MA State Representatives
Website:
MA Attorney General- Martha Coaxley
Email:
One Ashburton Place
Website:
Boston, MA 02108
Phone: (617) 727-2200
TTY: (617) 727-4765
MA Governor-Deval Patrick
Website
Massachusetts State House
Office of the Lt. Governor
Room 360
Boston, MA 02133
(888)-870-7770
NH Attorney General- Kelly Ayotte
Website:
33 Capitol Street
Concord, NH 03301
Telephone (603) 271-3658
NH Governor- John Lynch
Website:
State House
25 Capitol Street
Email:
Concord, NH 03301
(603)271-2121
NH State Representatives
Website:

No comments:

Post a Comment