Why is Internet Safety Important

Dangers on the Internet
The amazing freedom and availability of the Internet lends itself to a few major dangers: Pr0n, malware and how to perform illegal and/or dangerous activities.

Whether it is a curious person seeking these things out or the child accidentally clinking the wrong link and getting bombard with explicit pop-ups, the items lists can be harmful to an impressionable mind. Policies must be enforced.

There are a few groups that should have limited exposure to certain types of information on the Internet. Children, mentally handicapped or psychologically damaged people in settings such as schools, homes, rehabilitation or correctional facilities and group homes should be blocked, tracked and monitored while accessing the Internet. Certain information could destroy them if they don’t yet have the capacity to understand or put certain information in the proper context.


Protection from Pornography & Malware

In a professional setting there should be a written policy against accessing and/or downloading unacceptable material such as pornography. These items should be actively blocked whether in a working environment or at home among minors accessing the same system. Allowing impressionable or fragile minds unlimited access to certain graphic material is irresponsible. The law is also a good reason why Internet safety is important. If you are the owner or charged with immediate control of the system being used for illegal activity, you could be partially or wholly liable for the activity. An example is substitute teacher Julie Amero

On October 19, 2004, Julie Amero was substituting for a seventh-grade language class at Kelly Middle School in Norwich, Connecticut. The teacher’s computer was accessed by pupils while the regular teacher, Matthew Napp, was out of the room. When Julie took charge, the computer started showing pornographic images.

On January 5, 2007, Amero was convicted in Norwich Superior Court on four counts of risk of injury to a minor, or impairing the morals of a child. Her sentencing was delayed four times after her conviction, with both the prosecution and judge not satisfied that all aspects of the case had been assessed.[1] The felony charges for which she was originally convicted carry a maximum prison sentence of 40 years

– wikipedia

The Kelly Middle School systems were actually infected with malware that allowed the explicit pictures to pop up.

Access to Dangerous information

From the Columbine shooters to the Virginia Tech massacre, most of the killers had a recorded history of mental illness and/or psychologically instability. In many cases, they used public and/or home computers belonging to their parents to research bomb making or even purchase guns.

Controlling access is the best way to get on the Internet safely. Maintaining privacy of users is another important step in Internet safety, however that is a matter of educating users particularly if the frequent Social networks such as facebook or myspace. They need to be instructed about the dangers of stalkers, perverts and predators looking specifically for impressionable minds.

We are the keepers of these impressionable and fragile minds. That is the reason Internet safety is important and why we must be mindful of these subjects.

Dating Scams (audio cast)

[display_podcast]
dating scam Sadia Ghana
BEWARE OF DATING SITE SCAMS. There are a lot of false profiles out on the dating sites. The false ones are typically free member parasites and not usually paying members. Many of the false profiles are harmless member stealer’s. They are on there to flirt with you and try and get you to come to some other dating site. But some are trying to steal your heart to get to your money.

ONLINE DATING SCAM TACTICS:

Step 1) Take the Bait

You meet someone on a dating site (Adult Friend Finder, Match, okcupid, etc). This person has posted a picture of themselves and they are gorgeous!
Their profiles says something like:

I am a caring ,loving, honest, respectful and i believe in god and real people to hop to meet meet my real love here

There profile seems perfect. They sounds sweet, loving and caring. Their picture (if they have one) looks incredible. They seem to live pretty close.

What’s really going on? More than likely it is some ugly dude from a third world country who just learned to use a computer. They found a hot picture and posted it on the dating site. They are the exact opposite of what ever they said on their profile: they are uncaring, dishonest and don’t respect anyone… not even themselves.

Step 2) The Out of Country Story

You send them a message. They reply and tell you that they’d rather talk to you on email (usually hotmail or yahoo). They then proceed to tell you that they are currently in another country (Nigeria, Ghana, Mali, England), but they have some sort of connection to the states in your local area. They’ll say they’re relatives are there or they do business their and they’d love to meet you sometime.

What’s really going on? They really are outside of whatever country you are (usually Nigeria, Ghana, West Africa – this is one of the top scams in that region).

Step 3) Relationship Deception

What they do next is get a steady relationship with you. They will send more pictures. They will want to know more about you so they can cater to your ego. They will tell you they love you, tell you how good you look, how great you are. Basically, anything get the relationship going.

What’s really going on? They are lying to you and 20 other people on 5 or 6 different dating sites.

Step 4) A Crisis: they Need Money

There are various lies they may use to get money. They will ask for cash to buy the ticket to come visit you or they will tell you a tragedy has occurred and they need your help maybe even with a promise to pay you back.

What’s really going on? They are attempting to take your money and spend it on bullshit.

Clues to Spot Dating Scams:

Pictures look too professional. Magazine quality photos should be a dead give away. If they send a series of pics and each one looks like a “model posed” photo shoot, be suspicious.
BAD GRAMMAR & SPELLING. They are typically not very well educated and it will sometimes come through loud the clear via very choppy English and slight stupid logic. Sometimes it is as bad as a 3rd grader (a dumb 3rd grader).
Western Africa. Be suspicious of ANYTHING from from Ghana, Mali and especially Nigeria.
Too much love, too fast. They will almost immediately start talking about “I love you”, “I miss you” – don’t be flattered… they don’t love you… trust me.

Disclaimer: Miracles do happen. Maybe you’ve just met a West African supermodel, with bad grammar, who has fallen madly in love with you in the course of two or three emails.

Conclusion:
I’ve dealt with these scammers on ebay, email, dating sites and in chat rooms and one thing I’ve noticed is that they are actually not very smart. They are just ruthless. They take advantage of people’s trust, kindness and generosity. They are not so much predators as they are parasites that jump from host to host. They feed on the infrastructure and wealth of Western Civilization and have nothing at all to contribute to humanity but ignorance and greed. The sad thing is that these few greedy, idiots are giving ALL West Africans a bad name on the Web and these nations (particularly Ghana & Nigeria) are among the richest nations in Africa with the greatest potential of having great success in any and all endeavors. Its a real shame.

Richest African Countries 2006: GDP Per Country

1. South Africa … $606.4 billion in international$ (up 8% from 2005)
2. Algeria … $262.2 billion (up 8.5%)
3. Nigeria … $181.8 billion (up 10.2%)
4. Morocco … $150.8 billion (up 4.8%)
5. Sudan … $98.8 billion (up 11.2%)
6. Tunisia … $91.4 billion (up 7.4%)
7. Ethiopia … $78.4 billion (up 12%)
8. Ghana … $59.4 billion (up 9.1%)

If you are looking for real relationships online, here are some good resources on how to make it happen!

Avoid dating scams

Avoid dating scams

Avoid dating scams

Avoid dating scams

Avoid dating scams

Avoid dating scams

Computers Hacking People ver 2.0

[display_podcast]

I honestly think you ought to calm down; take a stress pill and think things over. – Hal, 2001 Space Odyssey

Information Systems will eventually have the infrastructure and ability to “socially engineer” its creators. This is far fetched science fiction blooming before our very eyes being created by our own hands.
It will happen when three criteria are in place: 1) The creation of laws that can completely disregard the privacy and sovereignty of human beings. 2) The advancement of Information Awareness System and 3) Smart Artificial Intelligence

LAWS
Lets discuss the situations that will give governments the pretext to implement laws to track their citizens. This is happening now. Laws and systems are being created for unchecked monitoring of individuals under the guise of security, safety and prosperity. Systems such as national ID cards.
They were implemented after the Sept 11 attacks on the World Trade Center and in the U.K. after the 7 July attacks in London.

It was 19th Century philosopher Samuel T. Coleridge who said, “In politics, what begins in fear usually ends in folly.”

Imagine it: The PATRIOT ACT IV is passed as a result of recent Critical Infrastructure cyber-terrorism attacks. International terrorists implement a globally synchronized Distributed Denial of Service Attack against the worlds Root nameservers and successfully cripple the Internet for three days. The impact is devastating as corporations lose billions.

Domestic Cyber Terrorists infiltrate hospitals by becoming apart of the staff only to socially engineer and infecting HIPPA protected networks with virus’ that wipe out databases and actually scramble prescriptions causing an array of death by misdiagnoses.

Local police and security personnel repeatedly thwart numerous attempts by religious fundamentalists to detonate suit case sized tactical nuclear weapons inside major United State cities but security professionals predict that it is only a matter of time before at least one slips through the cracks. All the enemy needs is one.
Patriot Act IV is the patron saint of lawmakers who have been screamed at by constituents to “DO SOMETHING NOW!” The new Patriot Act is eventually internationally accepted and allows for unrestricted Data Mine into commercial and state owned databases worldwide (US-EU). It of course has deferent names and variations world wide but its application is the same. In the United Kingdom it is called the Civil Contingencies Bill. The data mining would tap into the “transaction space” by accessing hospital, financial transaction and legal databases world wide to be shared by all law enforcement agencies (county, federal, city local and international). The system works like a global Amber Alert system that can track criminals anywhere in the world and notify the respective local agency immediately. The system works very, very well.
I honestly think you ought to calm down; take a stress pill and think things over. – Hal, 2001 Space Odyssey

Information Systems will eventually have the infrastructure and ability to “socially engineer” its creators. This is far fetched science fiction blooming before our very eyes being created by our own hands.
It will happen when three criteria are in place: 1) The creation of laws that can completely disregard the privacy and sovereignty of human beings. 2) The advancement of Information Awareness System and 3) Smart Artificial Intelligence

LAWS
Lets discuss the situations that will give governments the pretext to implement laws to track their citizens. This is happening now. Laws and systems are being created for unchecked monitoring of individuals under the guise of security, safety and prosperity. Systems such as national ID cards.
They were implemented after the Sept 11 attacks on the World Trade Center and in the U.K. after the 7 July attacks in London.

It was 19th Century philosopher Samuel T. Coleridge who said, “In politics, what begins in fear usually ends in folly.”

Imagine it: The PATRIOT ACT IV is passed as a result of recent Critical Infrastructure cyber-terrorism attacks. International terrorists implement a globally synchronized Distributed Denial of Service Attack against the worlds Root nameservers and successfully cripple the Internet for three days. The impact is devastating as corporations lose billions.

Domestic Cyber Terrorists infiltrate hospitals by becoming apart of the staff only to socially engineer and infecting HIPPA protected networks with virus’ that wipe out databases and actually scramble prescriptions causing an array of death by mis diagnosis.

Local police and security personnel repeatedly thwart numerous attempts by religious fundamentalists to detonate suit case sized tactical nuclear weapons inside major United State cities but security professionals predict that it is only a matter of time before at least one slips through the cracks. All the enemy needs is one.
Patriot Act IV is the patron saint of lawmakers who have been screamed at by constituents to “DO SOMETHING NOW!” The new Patriot Act is eventually internationally accepted and allows for unrestricted Data Mine into commercial and state owned databases worldwide (US-EU). It of course has deferent names and variations world wide but its application is the same. In the United Kingdom it is called the Civil Contingencies Bill. The data mining would tap into the “transaction space” by accessing hospital, financial transaction and legal databases world wide to be shared by all law enforcement agencies (county, federal, city local and international). The system works like a global Amber Alert system that can track criminals anywhere in the world and notify the respective local agency immediately. The system works very, very well.

Information Awareness Systems

The system, developed under the direction of John Poindexter, then-director of DARPA’s
Information Awareness Office, was envisioned to give law enforcement access to private data without suspicion of wrongdoing or a warrant. — Electronic Privacy Information Center.

Government funded unrestricted Data Mining and Information Awareness programs develop and run revolutionary Information Awareness Systems. Despite public opinion, these National Security systems continue to work to protect the nation against enemies foreign and domestic. The system extracts data from its transactional databases and recognizes patterns of behavior that would fit that of a terrorist. The system is so exhaustive that is works with 70% accuracy and seamlessly in conjunction with systems such as Next Generation Facial Recognition systems and Activity, Recognition Monitoring for enhanced surveillance.


Artificial Intelligence
Within thirty years, we will have the technological means to create superhuman intelligence. Shortly after, the human era will be ended. – Vernon Vinge, 1993, What is the Singularity?

Artificial Intelligence has been in use for many years. It is greatly relied upon for businesses, hospitals, military units and even in forms of entertainment such as video games. However Strong Artificial Intelligence, the development of cognitive systems simulating the human brain, have been developing quietly in research labs around the world under programs dedicated to the “scientific understanding of the mechanisms underlying thought and intelligent behavior and their embodiment in machines. (AAAI)”

Smart Information Awareness is Strong Artificial Intelligence merged with Information Awareness Systems. Smart Information Awareness seems to go beyond merely recognizing patterns of behavior as it predicts the future actions of a given psychological profile with over 75% accuracy allowing Law Enforcement to be like an all seeing eye with incredible new methods of forensics and counterterrorism. Crime as a whole will be greatly reduced. System that recognize criminal patterns have been around for some time, Smart Information Awareness systems are a new trend.

The Smart Information Awareness system is so accurate in determining human behavior trends that it is used to track and manipulate consumer buying habits for corporations. With its accuracy, the system will be able to determine what marketing tools can be used to influence the behavior of buyers.

With unfettered access to consumer’s personal transactions, buying habits, methods of payment, and credit history a system would be able to pin point buyers who demonstrate interests in certain products and offer “special deals” a specific group of highly interested buyers.

Inevitably the very system (laws, practices and technologies) that successfully protects humanity from itself is used to manipulate and exploit humanity.

Perhaps you believe that there is nothing wring with this level of target marketing. If so, I submit to you these questions: What will separate humanity from cattle if every man, woman and child is seen as nothing but a number and a consumer to the system that we rely on to survive? Since we are already regarded as merely numbers and consumers by the corporate beast, how much control and information will we allow them to have?

Perhaps this is a bit much. Perhaps I exaggerate the technology and extent of fear that will breed it.

http://www.p2pnet.net/issue03/page1.html

http://www.epic.org/

http://www.jbholston.com/weblog_discussion.php?post_id=74
Statewatch.com – Secret EU-US agreement being negotiated. http://www.statewatch.org/news/2002/jul/11Auseu.htm
http://www.eff.org/Privacy/TIA/20030523_tia_report_review.php

http://www.aaai.org/

nin – TheSlip (thanks Trent)

Ray Kurzweil @ Google Zeitgeist

Civil Contingency Bill

Eschelon TIA – Total Information Awareness

Deep Thoughts by theVigilante: Kill Scammers

thevigilantei tell them all that i know what they are doing and that the more they contact me the easier it will be to track them down and kill them. maybe they lose sleep maybe not ,but to incite any fear is nice, after the pain and anguish they reek on unwitting people, i tell them i’ll make their children pay for their crimes. the net allows any one with proper binary understanding to track anyone down. all i need is an email address and i can find your ip address then you physical address then your name and then your life. May all the scammer die!

Deep Thoughts by thevigilante – kill scammers PodBite