Translate

Friday, April 29, 2011


Cyberstalking - Spyware and Privacy Protection
Know the Tools Cybercriminals Use to Access Your Information

There are so few people who understand how to stop a cyberstalker and repair the damage. Thousands become victims every year, and each of us is vulnerable. I know this firsthand because I was once a victim of cyberstalking. It took me years to recover my life and get my credit in order. Ever since then, my goal has been to shake people up and instill enough awareness of cyberstalking to get everyone to take protective and preventative steps both on and offline.

Cyberstalking CAN Happen To You
Think again. It can happen to you and here are some of the reasons:

  • Our global society's over reliance on technology
  • The increasing affordability of technology and its ease of use (virus software that used to be in the thousands is now less than a hundred dollars to purchase)
  • The remote distance and anonymity technology provides to give cover to those who would hesitate to do something more traceable
  • Not to mention the lack of enforceable laws – or even laws that address the problem period - to protect people
For all these reasons there has been a rapid rise in cyberstalking incidents.

We are all vulnerable.

The New Wild West Is Online
Here are some other famous people who have been hacked and harassed in the last few years: Sarah Palin, Bill O'Reilly, Miley Cyrus. While it isn't surprising that a celebrity might draw more ire or attention, they represent our collective vulnerability. Despite the familiarity and ease we feel while using the Internet, it is still a technological frontier town. The internet is only just coming out of its infancy and in many ways as unprotected as the Western one of our past. Lawmakers and consumers can't keep up with the swift leaps in accessible technology to know what is truly possible and what isn't.

Privacy protection programs for consumers including victims of crime are inadequate. Often police can't make an arrest because there is no evidence of a crime being committed. Over and over I've heard about victims being treated like idiots by law enforcement. I've been there, trying to explain what happened on my computer and why it's important, and meanwhile the cop taking my report pats me on the head and tells me to go home. With no smoking gun, it's only your word that a crime happened at all.

Cyberstalkers don't have to be super-hackers or have superior intelligence to achieve their goals. A quick search on the internet can reveal various cyberstalker tool kits making it easy for cyberstalkers to wreak havoc with little or no effort.

The Tools of the Trade
Take keylogging spyware for example. Keylogging spyware can be purchased online which provides a cyberstalker with detailed instructions explaining how to disguise the spyware as an innocuous file, such as a photo, attached to an email to send out to an unsuspecting victim. When you click on the disguised file thinking you're going to see a photograph of kittens in a basket, the keylogger spyware is silently installed in the background without your knowledge. This spyware records every keystroke typed on the victim's computer.

Think about that…your passwords, captured images on your computer screen and tracking all the websites you visit (including your credit card information if you log it in anywhere). To access the information, RemoteSpy clients would log into a website maintained by the online keylogging spyware company.

Sounds far-fetched, but millions of people have been victimized by this spyware and probably don't even know it. At the request of the Federal Trade Commission, a U.S. District Court has issued a temporary restraining order halting the sale of keylogger spyware. According to the FTC's complaint, the Florida-based CyberSpy Software, LLC marketed and sold RemoteSpy keylogger spyware to clients who would then secretly monitor unsuspecting consumers' computers.

And yet in law terms a "complaint" is not a finding or ruling that the defendants have actually violated the law. Another website selling key logging spyware will surely (if not already) pop up and continue to sell the keylogging spyware under another name.

No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)