Print

Print


bill
i can only say again
go back and read the arcives to see the big picture
judy


>From: Bill Isbell <[log in to unmask]>
>Reply-To: Parkinson's Information Exchange Network
><[log in to unmask]>
>To: [log in to unmask]
>Subject: Opportunities for Mischief Abound in the List
>Date: Tue, 22 Aug 2000 22:05:53 -0700
>
>
>To all of you real people, aliases, and others of the List.
>
>      I read with some amusement, then growing alarm, of the tempest in a
>teapot the Janet Paterson stirred up when she (apparently) mistakenly
>identified Mr. Paul Ayers as a non-real web identity. Mr. Ayers, please
>forgive me when I say "apparently".  I probably could settle the matter in
>my mind simply by calling you at the home phone number that you gave in
>your reply.
>
>      I'm not going to do that, however, because this furor really isn't
>about you.  Instead, it is about the frustrations felt by many over the
>increasing use of aliases to sway opinion and to intimidate others on chat
>rooms and lists such as ours.  Janet may have picked the wrong target, but
>she definitely is on the right subject.
>
>      When I first read some of  the scathing denouncements of the note
>"will the real paul ayers stand up?", I thought that Janet had found a
>particularly clever method of flushing out the frauds among us.  Some of
>the responses seemed to be all out of proportion to the stimuli and I
>wondered which of the attacks were from a person (or persons) with a
>special agenda.  They seemed to be too gleeful in finding Janet in
>error  --  too ready to offer solicitous advice on how to help her "mental
>problems".
>
>         (You may wish to re-examine for yourself some of the more
>outrageous responses. They make most interesting reading -- although a bit
>depressing -- especially the most recent attacks, which would appear to be
>attempting to justify the  first round of notes.)
>
>      An excellent counter-attack, I thought, to cast doubts on the motives
>and sanity of the person exposing the problem.  (Does it sound a little
>like the tactics of our most recent White House when dealing with its
>detractors?)
>
>      The notes written in Janet's defense -- frequently less eloquent, but
>also more believable --  have also made me wonder just who is attacking
>whom.  I still don't know, and it's probably not really necessary to find
>out.  I hadn't thought much about the subject of aliases before, only the
>occasional, "This approach seems familiar, but I thought that it came from
>another person".  Now, I believe that Janet has done us a favor in bringing
>attention to yet another problem for us on the List.
>
>      The freedom and the anonymity of the Internet are among its greatest
>strengths.  They must not, I believe, be abridged.  However, the conditions
>are ripe for great mischief --  and there is no doubt that opportunities
>for mischief abound.  A few minutes of searching the Internet for
>references on computer fraud and the use of aliases to trick and deceive
>others turned up too many examples to quote, but one of the more
>informative was written by the Columbus Police Department.  You may wish to
>scan the article, which I have copied below.
>
>         Another news story from the office of the Attorney General is also
>worth reading.  It talks about the concern and plans of the U.S. government
>to address problems that are not all that different from the one that we
>are apparently confronting on our List.  It quotes from a report, "The
>Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of
>the Internet", prepared by a special working group of high-ranking federal
>law enforcement officials, as well as other government agencies.
>
>         The report stresses the "need for real-time tracing of Internet
>communications across traditional jurisdictional
>boundaries, both domestically and internationally; the need to track down
>sophisticated users who commit unlawful acts on the Internet while hiding
>their identities."
>
>         "The Internet has afforded our society unparalleled opportunities,
>many of which we are just discovering, but it is also providing new
>opportunities for criminals to engage in crime."  (Attorney General Janet
>Reno in releasing the report.)
>
>http://www.apbnews.com"
>
>      Until a sure-fire method of identifying and exposing the
>trouble-makers among us, we can only try to be a bit more careful in our
>acceptance at face value of the statements made by others.  Too bad,
>because it's a pain to question the motives of our fellow List members, but
>this reluctance is what the frauds among us depend upon for the success of
>their cruel games.
>
>         I can't comment on Janet's motives or on her state of mind (and I
>wonder about those who do comment, so vociferously).  Paranoid
>delusions?  Hard to say, but . . . as someone once remarked, "Even
>paranoiacs have enemies".
>
>      Thus said, I await your comments.
>
>Bill Isbell
>66/3/15?
>-------------------------------------------------------------------------
>
>Article from the Columbus, Ohio, Division of Police
>
>http://www.police.ci.columbus.oh.us/SafetyIssues/INTSAFE.HTM"
>----------------------------------------------------------------------------
>The Internet can be a fun, educational, and entertaining place to visit.
>However, just as many other places in society to day, it can also be a
>dangerous place. Anyone who visits the Internet needs to be aware of the
>dangers, as well as the benefits. The purpose of these pages is to educate
>you on some of these dangers and to help you to protect yourself.
>----------------------------------------------------------------------------
>General Internet Safety
>The Internet is an opportunity for you to interact with people. It provides
>a communication link to businesses, entertainment, and education. Through
>the Internet you can interact with people from other towns, cities, and
>countries. You can learn about other cultures, customs and lifestyles. It
>is an opportunity to make new friends and learn more about the world in
>which we live.
>However, the Internet by design is an anonymous media. This aspect can make
>it easy for someone to use the Internet for criminal means. Because you are
>'speaking' with someone via your computer, it is nearly impossible to
>verify
>many things about that person. These may include:
>The Person's Identity - The Person with whom you are speaking may not be
>using their real name. It is possible with some Internet Service Providers
>(ISP's) to check the account information of someone you've had contact
>with.
>However, that person may have been using someone else's account or may have
>provided false information to the ISP.
>The Person's Description - We often take for granted the ability to see the
>person we are speaking with. However, on the Internet nothing can be
>verified.
>You can not use your eyes to verify the person's age, race, or even gender.
>The Person's Location - On the Internet it is very easy for someone to say
>they are one place, when in reality they could be around the corner or
>across the country.
>The Person's Intentions - Most people use the internet for honest and
>honorable intentions. However, someone who exploits the Internet,
>especially
>criminals and conartists, can seem very straightforward at first, but they
>are experts at manipulation. They use confidence-scams, or even just
>friendly
>conversation, to make you believe what they want you to believe. Then they
>have you act on that belief.
>Connection Security - Internet security is very important and new
>technologies
>are being developed everyday to ensure your protection. However, there are
>persons out there who know how to intercept communications. Your
>communication
>with a known friend or acquaintance could be seen by others. There is also
>no
>guarantee that the person you are 'speaking' with is acting alone or uses
>good
>security with your information.
>Common sense tempered with caution is still your best protection. Listed
>below
>are some safety tips you should use when communicating on-line:
>1. Do not give out any personal information, home address or phone number.
>If you are using a 'nickname' don't give out your real name to anyone you
>don't know. If you are listed in the phone book, they can use it to find
>you.
>2. Do not give anyone your account password. No legitimate and reputable
>ISP will send you a message or e-mail asking for your password or account
>information. Many hackers know how to send you messages that appear to be
>from your ISP. If you receive one of these messages contact your provider
>immediately!.
>3. Do not give out any personal account information such as internet
>account
>or personal financial accounts (credit card or checking/saving accounts)
>until you are absolutely sure of their credibility and connection security.
>4. Do not arrange a personal meeting with anyone you have met on the
>Internet
>unless, and until, you are able to verify their true identity and can
>arrange
>the following:
>* Meet in a public place that is well lighted and busy.
>* Meet during busy business hours and not close to closing or after dark.
>* Arrange your own transportation to and from the meeting.
>* Bring a friend; Double-date. Do not meet the person alone!
>REMEMBER: A stranger you meet on the Internet is just like a stranger
>you meet in a bar, restaurant, or on the street!! Use the same
>precautions you use in these situations, when meeting people on the
>Internet!!
>If you do have suspicions about someone you may have spoken with on the
>Internet, or if you have in someway been offended or threatened, contact
>your service provider immediately. Give them as much information about
>the situation as possible. This should include any contact information,
>such as on-screen name, account information (name, address, phone,
>account number) and/or e-mail address. You should also be straight-forward
>as to how you were offended or threatened. Most ISP's provide on-line
>information on reporting such incidents. Be familiar with your provider's
>procedures.
>If at any time you suspect criminal activity is taking place, or if you
>are threatened or harassed, you may contact the Columbus Division of Police
>Radio Room at 645-4545 to request a report. Be ready to provide the above
>information to the reporting officer.
>----------------------------------------------------------------------------
>**The information presented here was taken in part and
>with the permission of the University of Oklahoma Department
>of Public Safety's Website
>

________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com