If you are having trouble viewing this email, click here to view this online

 

VOLUME 48

   ISSUE 48

17 July 2015

Article of the Month  Around the World

Cyber Stalking and Cyber Harassment and how we can avoid it.

 

Introduction:
Over the past two decades, technology has surged into businesses, communities, and the lives of individuals, altering the way that people communicate, study, work, and interact. People in various parts of the world can communicate in real time on a variety of devices such as cell phones, tablets, or computers. A photo, video, text message, or email may be viewed by a single individual, shared with another or “go viral” and spread to hundreds of thousands of users in a matter of minutes. But unfortunately the Technology keeps improving, which in turn influences the way that people interact by promoting global communication and allowing individuals to connect with others more readily. However, the Internet and related technology have also become new mediums for misconduct, in that communications via the Internet can be used to threaten, harass, intimidate, and cause harm to others, meaning the internet we are using has its own dark side.
 

Overview:
What is Cyber-stalking? Cyber stalking is the use of the Internet, email or other electronic communications to stalk, and generally refers to a pattern of threatening or malicious behaviors. Cyber stalking may be considered the most dangerous of the three types of Internet harassment, based on a posing credible threat of harm. Sanctions range from misdemeanors to felonies.
What is Cyber harassment? Cyber harassment differs from cyber stalking in that it may generally be defined as not involving a credible threat. Cyber harassment usually pertains to threatening or harassing email messages, instant messages, or to blog entries or websites dedicated solely to tormenting an individual. Some states approach cyber harassment by including language addressing electronic communications in general harassment statutes, while others have created stand-alone cyber harassment statutes.
 

Types:

Stalking by strangers:
There isn't a single definition of a cyber-stalker, and they can be either strangers to the victim or have a former/present relationship. "[Cyber stalkers] come in all shapes, sizes, ages and backgrounds. They patrol Web sites looking for an opportunity to take advantage of people."

Gender-based stalking:
Harassment and stalking because of gender online is common, and can include rape threats and other threats of violence, as well as the posting of the victim's personal information. It is blamed for limiting victims' activities online or driving them offline entirely, thereby impeding their participation in online life and undermining their autonomy, dignity, identity, and opportunities.

Of intimate partners:
Cyber stalking of intimate partners is the online harassment of a current or former romantic partner. It is a form of domestic violence, and experts say its purpose is to control the victim in order to encourage social isolation and create dependency. Harassers may send repeated insulting or threatening e-mails to their victims, monitor or disrupt their victims' e-mail use, and use the victim's account to send e-mails to others posing as the victim or to purchase goods or services the victim does not want. They may also use the Internet to research and compile personal information about the victim, to use in order to harass him or her.


Of celebrities and public persons:
Profiling of stalkers shows that almost always they stalk someone they know or, via delusion, think they know, as is the case with stalkers of celebrities or public persons in which the stalkers feel they know the celebrity even though the celebrity does not know them. As part of the risk they take for being in the public eye, celebrities and public figures are often targets of lies or made-up stories in tabloids as well as by stalkers, some even seeming to be fans.

By anonymous online mobs:
Web technologies have enabled online groups of anonymous people to self-organize to target individuals with online defamation, threats of violence and technology-based attacks. These include publishing lies and doctored photographs, threats of rape and other violence, posting sensitive personal information about victims, e-mailing damaging statements about victims to their employers, and manipulating search engines to make damaging material about the victim more prominent. Victims frequently respond by adopting pseudonyms or going offline entirely.

Experts attribute the destructive nature of anonymous online mobs to group dynamics, saying that groups with homogeneous views tend to become more extreme. As members reinforce each other’s beliefs, they fail to see themselves as individuals and lose a sense of personal responsibility for their destructive acts. In doing so they dehumanize their victims, becoming more aggressive when they believe they are supported by authority figures. Internet service providers and website owners are sometimes blamed for not speaking out against this type of harassment.

Corporate cyber stalking:
Corporate cyber stalking is when a company harasses an individual online, or an individual or group of individuals harasses an organization. Motives for corporate cyber stalking are ideological, or include a desire for financial gain or revenge
 

 

How can you prevent someone from stalking you online?

• Be careful what personal information you share online including in email, on social networking sites like Facebook and Twitter and chat rooms. It is very easy to glean information about where you live, the places you love to go to in your area and the people you care about from posts and pictures.
• Create a different email account for registering in social networking sites and other online spaces. It will help avoid spam and your personal email won´t be revealed if the online service doesn’t have a good privacy practice.
• Do not feel obligated to fill out all fields when registering online or provide identifying information such as birthdates and place in required fields.
• In your online user profile, use a photo that doesn’t identify you or your location, so you can’t be recognized.
• Consider using a name that is not your real name or a nickname as your email name, screen name or user ID. And try not to use common dates such as your birthday as the digits in your email name or password. Instead, pick a name that is gender- and age-neutral. Treat your email and/or internet account like you would your credit card, ID or passport number – very carefully.
• If you are breaking up with an intimate partner – especially if they are abusive, troubled, angry or difficult – reset every single password on all of your accounts, from email and social networking accounts to bank accounts, to something they cannot guess.
• Services such as Facebook change their privacy policy all the time, so it is a good idea to check your privacy settings to make sure you are sharing the information you want to share with people you trust and not the general internet public. Some sites have options for you to test how your profile is being viewed by others – test and make sure you only reveal what is absolutely necessary.
• What information are family and friends posting about you? Let them know your concerns about privacy and help them learn better privacy settings.
• Do an internet search of your name regularly and monitor where you appear online. If you find unauthorized info about yourself online, contact the website moderator to request its removal.
• Make sure that your internet service provider (ISP), cell phone service, instant messenger (called internet relay chat, or IRC in some terms of service) network and other services you use has an acceptable privacy policy that prohibits cyber stalking. If they have none, suggest they create one and/or switch to a provider that is more responsive to user privacy concerns and complaints.
• Try keeping your web cam closed/taped whenever you are not using it.

What should you do if someone starts stalking you online?

• Trust your instincts. If you feel uncomfortable or an online situation becomes hostile, remove yourself from the online space by logging off or surfing elsewhere, or block the other person´s access to you.
• If you are receiving unwanted contact, make clear to that person that you would like him or her not to contact you again. Many women who have reported being harassed do this and warn that any further contact will result in the filing of a police report. Depending on the harasser, engagement with the person can escalate or cease, so if you consider contact appropriate and necessary, do so once and document it.
• Save all communications with the stalker for evidence. Do not edit or alter them in any way. Try using print screens, especially if the harassment is happening in real-time.
• If the harasser posts comments on your blog, keep copies but also consider not publishing rather than deleting abusive posts.
• Keep a record of your communications with internet system administrators or law enforcement officials if you report the stalker to authorities. Record-keeping is absolutely crucial so keep everything, even though the immediate desire might be to delete the communication from the stalker and try to forget about it. Back up these communications on another computer or removable memory stick or external hard drive.
• Consider blocking or filtering messages from the harasser. Many email programs have a filter feature. Chat room contact can also be blocked, and you can activate the ‘IP address block’ option on your blog or website if someone posts harassing comments continuously.
• If your internet searches reveal that the stalker is publishing harmful information about you in other online spaces, make a complaint to the moderators/managers of the external site. State that you view this as part of a continuing situation of online harassment towards you, and request that they either block the harasser’s IP, remove posts, or caution the harasser to cease or be blocked.
• Tell your family and friends that someone is stalking you online. Being stalked – online or offline – is a traumatic experience and support from your family and friends is critical at this time to help you cope. Also check what they are revealing about you and their relationship with you in their online spaces, albeit inadvertently.
After reading this article I hope it will give you an idea about what Cyber Harassments and Stalking is all about and not to be a victim of it. Think twice before publishing anything using internet specially your pictures, videos etc. Always make sure you are secured on the web. Be responsible about yourself and the others.
 

 

-Sithira Hewaarachchi

Information Security Engineer – Intern
Sri Lanka Cert | CC
BEng (Reading) Software Engineering
University Of Westminster, UK


 

1.http://antivirus.about.com/od/securitytips/tp/
 

 
  
  Hospitals Breached via Medical Devices?
  

“..Many were surprised to read that extremely sophisticated and expensive medical devices, such as X-Ray machines and Blood Gas Analyzers, ... ....”

  Cloud First policy yet to take off in Whitehall
  

'....New research shows that more than half of Whitehall IT staff are still not comfortable using cloud IT, two years since the government launched its ‘Cloud First’ policy.....'

Despite warnings, majority of firms still run some Windows Server 2003

   

  

'...Enterprises are still heavily dependent on Windows Server 2003 even though there were plenty of warnings that support is coming to an end on July 14 -- and this opens them up to security, compliance and operational risks....'

MICROSOFT BACKS OFF PHONE BUSINESS WITH REORGANIZATION, LAYOFFS

  

'...The folks in Redmond made sweeping changes to the Windows Phone business this week. The company plans to lay off almost 8.000 employees, primarily in the phone business. It is also going to take a $7.6 billion impairment charge related to the acquisition of Nokia's handset business.....'

OPM DOESN'T KNOW WHOM IT WILL HIRE TO PROTECT THE 21.5 MILLION AFFECTED BY HACK

'...The Office of Personnel Management announced Thursday that a breach of a database that contained federal employees' background-check information led to the theft of 21.5 million individuals' Social Security numbers. And the personnel agency said it would notify the affected individuals and supply them with at least three years of credit-monitoring and identity-fraud protection services..."

Month in Brief
Facebook Incidents Reported to Sri Lanka CERT|CC in June 2015
 
  
  Fake
 Hacked
  Other
   
 Statistics - Sri Lanka CERT|CC

IBM HAS BUILT THE MOST POWERFUL COMPUTER CHIPS IN THE WORLD

'"....Since 1965, we have held onto the belief that computing power will double every two years, as argued in a paper by Gordon Moore, the eventual founder of Intel. But in recent years, scientists have been straining to keep Moore’s Law alive, as we start to approach the physical limit of how small we can make silicon chips....'

​Internet voting not ready yet, but can be made more secure
 

'...That's great! Except, well, how do you choose which one is right for you? It used to be that most people decided simply on the basis of how much free storage you got. That had the advantage of being simple, but it only tells part of the story....'

The Past, Present, and Future of Phishing and Malware

'...A push to allow Internet voting in elections is growing stronger along with advances in the underlying technology, but systems are not yet secure enough to use with relative certainty that the vote counts will be accurate, according to a new report...'

Popular Android games unmasked as phishing tools

 

 

'....ESET researchers have discovered a new, ingenious, yet very simple Facebook phishing scheme: playable Android games that, before they are started, ask users to enter their Facebook credentials.....'

VIDEO: GOOGLE CHROME HACKS YOU NEED TO KNOW

 

 

'...."Whether doing online research for a work presentation or hunting for the perfect birthday gift, things can get a little jumbled. With 50 tabs open at once and hundreds of bookmarks, how do you sort through everything and find what you need?...'

 
Notice Board
  Training and Awareness Programmes - July 2015
  
DateEventVenue
- 13/07/2015-17/07/2015 Intel Teach Training ICT Branch, Ministry of Education
13/07/2015-16/07/2015 Java fundamental Training National Institute of Education
10/07/2015 Workshop on Teachers' Service Minute ICT Branch, Ministry of Education

Brought to you by: