Print

Print


To all of you real people, aliases, and others of the List.

      I read with some amusement, then growing alarm, of the tempest in a
teapot the Janet Paterson stirred up when she (apparently) mistakenly
identified Mr. Paul Ayers as a non-real web identity. Mr. Ayers, please
forgive me when I say "apparently".  I probably could settle the matter in
my mind simply by calling you at the home phone number that you gave in
your reply.

      I'm not going to do that, however, because this furor really isn't
about you.  Instead, it is about the frustrations felt by many over the
increasing use of aliases to sway opinion and to intimidate others on chat
rooms and lists such as ours.  Janet may have picked the wrong target, but
she definitely is on the right subject.

      When I first read some of  the scathing denouncements of the note
"will the real paul ayers stand up?", I thought that Janet had found a
particularly clever method of flushing out the frauds among us.  Some of
the responses seemed to be all out of proportion to the stimuli and I
wondered which of the attacks were from a person (or persons) with a
special agenda.  They seemed to be too gleeful in finding Janet in
error  --  too ready to offer solicitous advice on how to help her "mental
problems".

         (You may wish to re-examine for yourself some of the more
outrageous responses. They make most interesting reading -- although a bit
depressing -- especially the most recent attacks, which would appear to be
attempting to justify the  first round of notes.)

      An excellent counter-attack, I thought, to cast doubts on the motives
and sanity of the person exposing the problem.  (Does it sound a little
like the tactics of our most recent White House when dealing with its
detractors?)

      The notes written in Janet's defense -- frequently less eloquent, but
also more believable --  have also made me wonder just who is attacking
whom.  I still don't know, and it's probably not really necessary to find
out.  I hadn't thought much about the subject of aliases before, only the
occasional, "This approach seems familiar, but I thought that it came from
another person".  Now, I believe that Janet has done us a favor in bringing
attention to yet another problem for us on the List.

      The freedom and the anonymity of the Internet are among its greatest
strengths.  They must not, I believe, be abridged.  However, the conditions
are ripe for great mischief --  and there is no doubt that opportunities
for mischief abound.  A few minutes of searching the Internet for
references on computer fraud and the use of aliases to trick and deceive
others turned up too many examples to quote, but one of the more
informative was written by the Columbus Police Department.  You may wish to
scan the article, which I have copied below.

         Another news story from the office of the Attorney General is also
worth reading.  It talks about the concern and plans of the U.S. government
to address problems that are not all that different from the one that we
are apparently confronting on our List.  It quotes from a report, "The
Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of
the Internet", prepared by a special working group of high-ranking federal
law enforcement officials, as well as other government agencies.

         The report stresses the "need for real-time tracing of Internet
communications across traditional jurisdictional
boundaries, both domestically and internationally; the need to track down
sophisticated users who commit unlawful acts on the Internet while hiding
their identities."

         "The Internet has afforded our society unparalleled opportunities,
many of which we are just discovering, but it is also providing new
opportunities for criminals to engage in crime."  (Attorney General Janet
Reno in releasing the report.)

http://www.apbnews.com"

      Until a sure-fire method of identifying and exposing the
trouble-makers among us, we can only try to be a bit more careful in our
acceptance at face value of the statements made by others.  Too bad,
because it's a pain to question the motives of our fellow List members, but
this reluctance is what the frauds among us depend upon for the success of
their cruel games.

         I can't comment on Janet's motives or on her state of mind (and I
wonder about those who do comment, so vociferously).  Paranoid
delusions?  Hard to say, but . . . as someone once remarked, "Even
paranoiacs have enemies".

      Thus said, I await your comments.

Bill Isbell
66/3/15?
-------------------------------------------------------------------------

Article from the Columbus, Ohio, Division of Police

http://www.police.ci.columbus.oh.us/SafetyIssues/INTSAFE.HTM"
----------------------------------------------------------------------------
The Internet can be a fun, educational, and entertaining place to visit.
However, just as many other places in society to day, it can also be a
dangerous place. Anyone who visits the Internet needs to be aware of the
dangers, as well as the benefits. The purpose of these pages is to educate
you on some of these dangers and to help you to protect yourself.
----------------------------------------------------------------------------
General Internet Safety
The Internet is an opportunity for you to interact with people. It provides
a communication link to businesses, entertainment, and education. Through
the Internet you can interact with people from other towns, cities, and
countries. You can learn about other cultures, customs and lifestyles. It
is an opportunity to make new friends and learn more about the world in
which we live.
However, the Internet by design is an anonymous media. This aspect can make
it easy for someone to use the Internet for criminal means. Because you are
'speaking' with someone via your computer, it is nearly impossible to verify
many things about that person. These may include:
The Person's Identity - The Person with whom you are speaking may not be
using their real name. It is possible with some Internet Service Providers
(ISP's) to check the account information of someone you've had contact with.
However, that person may have been using someone else's account or may have
provided false information to the ISP.
The Person's Description - We often take for granted the ability to see the
person we are speaking with. However, on the Internet nothing can be
verified.
You can not use your eyes to verify the person's age, race, or even gender.
The Person's Location - On the Internet it is very easy for someone to say
they are one place, when in reality they could be around the corner or
across the country.
The Person's Intentions - Most people use the internet for honest and
honorable intentions. However, someone who exploits the Internet, especially
criminals and conartists, can seem very straightforward at first, but they
are experts at manipulation. They use confidence-scams, or even just friendly
conversation, to make you believe what they want you to believe. Then they
have you act on that belief.
Connection Security - Internet security is very important and new
technologies
are being developed everyday to ensure your protection. However, there are
persons out there who know how to intercept communications. Your
communication
with a known friend or acquaintance could be seen by others. There is also no
guarantee that the person you are 'speaking' with is acting alone or uses
good
security with your information.
Common sense tempered with caution is still your best protection. Listed
below
are some safety tips you should use when communicating on-line:
1. Do not give out any personal information, home address or phone number.
If you are using a 'nickname' don't give out your real name to anyone you
don't know. If you are listed in the phone book, they can use it to find
you.
2. Do not give anyone your account password. No legitimate and reputable
ISP will send you a message or e-mail asking for your password or account
information. Many hackers know how to send you messages that appear to be
from your ISP. If you receive one of these messages contact your provider
immediately!.
3. Do not give out any personal account information such as internet account
or personal financial accounts (credit card or checking/saving accounts)
until you are absolutely sure of their credibility and connection security.
4. Do not arrange a personal meeting with anyone you have met on the Internet
unless, and until, you are able to verify their true identity and can arrange
the following:
* Meet in a public place that is well lighted and busy.
* Meet during busy business hours and not close to closing or after dark.
* Arrange your own transportation to and from the meeting.
* Bring a friend; Double-date. Do not meet the person alone!
REMEMBER: A stranger you meet on the Internet is just like a stranger
you meet in a bar, restaurant, or on the street!! Use the same
precautions you use in these situations, when meeting people on the
Internet!!
If you do have suspicions about someone you may have spoken with on the
Internet, or if you have in someway been offended or threatened, contact
your service provider immediately. Give them as much information about
the situation as possible. This should include any contact information,
such as on-screen name, account information (name, address, phone,
account number) and/or e-mail address. You should also be straight-forward
as to how you were offended or threatened. Most ISP's provide on-line
information on reporting such incidents. Be familiar with your provider's
procedures.
If at any time you suspect criminal activity is taking place, or if you
are threatened or harassed, you may contact the Columbus Division of Police
Radio Room at 645-4545 to request a report. Be ready to provide the above
information to the reporting officer.
----------------------------------------------------------------------------
**The information presented here was taken in part and
with the permission of the University of Oklahoma Department
of Public Safety's Website