bill i can only say again go back and read the arcives to see the big picture judy >From: Bill Isbell <[log in to unmask]> >Reply-To: Parkinson's Information Exchange Network ><[log in to unmask]> >To: [log in to unmask] >Subject: Opportunities for Mischief Abound in the List >Date: Tue, 22 Aug 2000 22:05:53 -0700 > > >To all of you real people, aliases, and others of the List. > > I read with some amusement, then growing alarm, of the tempest in a >teapot the Janet Paterson stirred up when she (apparently) mistakenly >identified Mr. Paul Ayers as a non-real web identity. Mr. Ayers, please >forgive me when I say "apparently". I probably could settle the matter in >my mind simply by calling you at the home phone number that you gave in >your reply. > > I'm not going to do that, however, because this furor really isn't >about you. Instead, it is about the frustrations felt by many over the >increasing use of aliases to sway opinion and to intimidate others on chat >rooms and lists such as ours. Janet may have picked the wrong target, but >she definitely is on the right subject. > > When I first read some of the scathing denouncements of the note >"will the real paul ayers stand up?", I thought that Janet had found a >particularly clever method of flushing out the frauds among us. Some of >the responses seemed to be all out of proportion to the stimuli and I >wondered which of the attacks were from a person (or persons) with a >special agenda. They seemed to be too gleeful in finding Janet in >error -- too ready to offer solicitous advice on how to help her "mental >problems". > > (You may wish to re-examine for yourself some of the more >outrageous responses. They make most interesting reading -- although a bit >depressing -- especially the most recent attacks, which would appear to be >attempting to justify the first round of notes.) > > An excellent counter-attack, I thought, to cast doubts on the motives >and sanity of the person exposing the problem. (Does it sound a little >like the tactics of our most recent White House when dealing with its >detractors?) > > The notes written in Janet's defense -- frequently less eloquent, but >also more believable -- have also made me wonder just who is attacking >whom. I still don't know, and it's probably not really necessary to find >out. I hadn't thought much about the subject of aliases before, only the >occasional, "This approach seems familiar, but I thought that it came from >another person". Now, I believe that Janet has done us a favor in bringing >attention to yet another problem for us on the List. > > The freedom and the anonymity of the Internet are among its greatest >strengths. They must not, I believe, be abridged. However, the conditions >are ripe for great mischief -- and there is no doubt that opportunities >for mischief abound. A few minutes of searching the Internet for >references on computer fraud and the use of aliases to trick and deceive >others turned up too many examples to quote, but one of the more >informative was written by the Columbus Police Department. You may wish to >scan the article, which I have copied below. > > Another news story from the office of the Attorney General is also >worth reading. It talks about the concern and plans of the U.S. government >to address problems that are not all that different from the one that we >are apparently confronting on our List. It quotes from a report, "The >Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of >the Internet", prepared by a special working group of high-ranking federal >law enforcement officials, as well as other government agencies. > > The report stresses the "need for real-time tracing of Internet >communications across traditional jurisdictional >boundaries, both domestically and internationally; the need to track down >sophisticated users who commit unlawful acts on the Internet while hiding >their identities." > > "The Internet has afforded our society unparalleled opportunities, >many of which we are just discovering, but it is also providing new >opportunities for criminals to engage in crime." (Attorney General Janet >Reno in releasing the report.) > >http://www.apbnews.com" > > Until a sure-fire method of identifying and exposing the >trouble-makers among us, we can only try to be a bit more careful in our >acceptance at face value of the statements made by others. Too bad, >because it's a pain to question the motives of our fellow List members, but >this reluctance is what the frauds among us depend upon for the success of >their cruel games. > > I can't comment on Janet's motives or on her state of mind (and I >wonder about those who do comment, so vociferously). Paranoid >delusions? Hard to say, but . . . as someone once remarked, "Even >paranoiacs have enemies". > > Thus said, I await your comments. > >Bill Isbell >66/3/15? >------------------------------------------------------------------------- > >Article from the Columbus, Ohio, Division of Police > >http://www.police.ci.columbus.oh.us/SafetyIssues/INTSAFE.HTM" >---------------------------------------------------------------------------- >The Internet can be a fun, educational, and entertaining place to visit. >However, just as many other places in society to day, it can also be a >dangerous place. Anyone who visits the Internet needs to be aware of the >dangers, as well as the benefits. The purpose of these pages is to educate >you on some of these dangers and to help you to protect yourself. >---------------------------------------------------------------------------- >General Internet Safety >The Internet is an opportunity for you to interact with people. It provides >a communication link to businesses, entertainment, and education. Through >the Internet you can interact with people from other towns, cities, and >countries. You can learn about other cultures, customs and lifestyles. It >is an opportunity to make new friends and learn more about the world in >which we live. >However, the Internet by design is an anonymous media. This aspect can make >it easy for someone to use the Internet for criminal means. Because you are >'speaking' with someone via your computer, it is nearly impossible to >verify >many things about that person. These may include: >The Person's Identity - The Person with whom you are speaking may not be >using their real name. It is possible with some Internet Service Providers >(ISP's) to check the account information of someone you've had contact >with. >However, that person may have been using someone else's account or may have >provided false information to the ISP. >The Person's Description - We often take for granted the ability to see the >person we are speaking with. However, on the Internet nothing can be >verified. >You can not use your eyes to verify the person's age, race, or even gender. >The Person's Location - On the Internet it is very easy for someone to say >they are one place, when in reality they could be around the corner or >across the country. >The Person's Intentions - Most people use the internet for honest and >honorable intentions. However, someone who exploits the Internet, >especially >criminals and conartists, can seem very straightforward at first, but they >are experts at manipulation. They use confidence-scams, or even just >friendly >conversation, to make you believe what they want you to believe. Then they >have you act on that belief. >Connection Security - Internet security is very important and new >technologies >are being developed everyday to ensure your protection. However, there are >persons out there who know how to intercept communications. Your >communication >with a known friend or acquaintance could be seen by others. There is also >no >guarantee that the person you are 'speaking' with is acting alone or uses >good >security with your information. >Common sense tempered with caution is still your best protection. Listed >below >are some safety tips you should use when communicating on-line: >1. Do not give out any personal information, home address or phone number. >If you are using a 'nickname' don't give out your real name to anyone you >don't know. If you are listed in the phone book, they can use it to find >you. >2. Do not give anyone your account password. No legitimate and reputable >ISP will send you a message or e-mail asking for your password or account >information. Many hackers know how to send you messages that appear to be >from your ISP. If you receive one of these messages contact your provider >immediately!. >3. Do not give out any personal account information such as internet >account >or personal financial accounts (credit card or checking/saving accounts) >until you are absolutely sure of their credibility and connection security. >4. Do not arrange a personal meeting with anyone you have met on the >Internet >unless, and until, you are able to verify their true identity and can >arrange >the following: >* Meet in a public place that is well lighted and busy. >* Meet during busy business hours and not close to closing or after dark. >* Arrange your own transportation to and from the meeting. >* Bring a friend; Double-date. Do not meet the person alone! >REMEMBER: A stranger you meet on the Internet is just like a stranger >you meet in a bar, restaurant, or on the street!! Use the same >precautions you use in these situations, when meeting people on the >Internet!! >If you do have suspicions about someone you may have spoken with on the >Internet, or if you have in someway been offended or threatened, contact >your service provider immediately. Give them as much information about >the situation as possible. This should include any contact information, >such as on-screen name, account information (name, address, phone, >account number) and/or e-mail address. You should also be straight-forward >as to how you were offended or threatened. Most ISP's provide on-line >information on reporting such incidents. Be familiar with your provider's >procedures. >If at any time you suspect criminal activity is taking place, or if you >are threatened or harassed, you may contact the Columbus Division of Police >Radio Room at 645-4545 to request a report. Be ready to provide the above >information to the reporting officer. >---------------------------------------------------------------------------- >**The information presented here was taken in part and >with the permission of the University of Oklahoma Department >of Public Safety's Website > ________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com