Forum
|
| | Wednesday, March 29, 2000 - 10:08 pm March 30, 2000 To: Phoenix FBI Field Office Via e-mail to phoenix@fbi.gov and posted at http://www.bayhouse.com/discus/messages/6/457.html?954403734 Dear FBI: My name is Christine Baker and I administer my Forums at http://www.bayhouse.com/discus/. Several weeks ago one of the regular posters, Kristi Feathers, was threatened by an anonymous poster AKA Robert. She attracted his attention because she posted that people didn't need to pay Robert $150 for fake credit tradelines. Supposedly she had an interview with the FBI, I provided her with the IP numbers for Robert's postings. Then I exposed Robert in the forum as the fraud he is, and he promptly threatened to post my social security number and continued to post occasionally. I called FBI operator 8208 on 3/21/00 to find out what was going on. He refused to provide any information, so I initiated my own complaint. Operator 8208 was not particularly interested or helpful. When I asked for the FBI E-mail he referred me to your web site, which has absolutely NO information about complaints. I subsequently never heard from him or anyone else at the FBI. Last Sunday I received 51 messages from Blue Mountain Arts titled "Copy: Whore" The card I looked at is at http://www1.bluemountain.com/cards/box5672e/jgu4mfgmscutuzy.htm and it reads "To Whore." It took some effort, but I finally got the IP from Blue Mountain Arts: "Web access from: 32.101.176.27, time:Mar 27 00:33:49 2000 ....For this IP address the provider information is: .ca.us.prserv.net" That's the same ISP as Robert's. A few hours later I got 124 mails from greetingcard.com. I looked at one of the postcards at http://card.greetingshop.com/cgi-bin/magiccard.cgi?032702541117892 and it read: "Hello FATWHORE YOU FAT WHORE Good Bye mmm" I'm still waiting for a response from greetingcard.com. So now all I'd like to hear from you is whether this is of any interest to you, whether you can refer me to some agency that gives a damn. And if nobody cares, that's fine too. I have always been able to take care of myself, and I got the money to hire people. But just in case I get caught doing something illegal I'd like to be able to prove that I tried my legal options. Postings at my forum state that Robert has been investigated by the FBI before, that he posts all over the net, he scams people into sending them money for nothing, and when someone exposes his fraud he threatens them. I find it hard to believe that the FBI can't take care of a jerk like Robert. I hope we'll find out what's really going on. Please respond via e-mail or post a follow-up at the forum. Thank you very much, Christine Baker
|
| | Thursday, March 30, 2000 - 06:51 am Christine: I too received 71 emailes titled "Bitch". I turned those over as well and had the poster's email shut down at hotmail. This ip address: ca.us.prserv.net" is the same one who threatened me and the same one that matched all the anon postings. Additionally it is recorded at creditnet board under several alias names all ones who are either attacking others or posting slandering info about others. It is also the IP address who is posting here "Credit Ranger is a fraud". This person left their cell phone number in his first post on your site and it is registered to him out of anaheim. I have turned all of that over to FBI in Los Angeles and so far they seem interested and helpful. There are strict laws against internet stalking as I was informed by the FBI. This same person claimed he ran my credit and also slandered many others with credit ranger & you being his latest interest. It is amazing that this is the same person who is asking for people to turn over their social security numbers to him.
|
| | Thursday, March 30, 2000 - 01:40 pm Well, at least the FBI was quick to respond: Dear Christine, The FBI has received your information. Harassment on the Internet should be reported to your Internet Service Provider. If the harassment escalates and becomes threatening, contact our Phoenix Division at (602) 279-5511 and request to speak with the duty officer. There must be a specific statement of threat to kill you or do you bodily harm for the FBI to have jurisdiction. ---------------------------------------------- Exactly what I expected. And WTF is my ISP supposed to do? I guess I'll send this to Mindspring now.
|
| | Thursday, March 30, 2000 - 01:56 pm From: http://fs.dai.net/ac/292857/E01.html?http://www.cyberguards.com CyberStalking What Is Cyberstalking? From the U.S. Department of Justice Although there is no universally accepted definition of cyberstalking, the term is used in this report to refer to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim's immediate family; and still others require only that the alleged stalker's course of conduct constitute an implied threat. While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously. Nature and Extent of Cyberstalking Although online harassment and threats can take many forms, cyberstalking shares important characteristics with offline stalking. Many stalkers - online or off - are motivated by a desire to exert control over their victims and engage in similar types of behavior to accomplish this end. As with offline stalking, the available evidence (which is largely anecdotal) suggests that the majority of cyberstalkers are men and the majority of their victims are women, although there have been reported cases of women cyberstalking men and of same-sex cyberstalking. In many cases, the cyberstalker and the victim had a prior relationship, and the cyberstalking begins when the victim attempts to break off the relationship. However, there also have been many instances of cyberstalking by strangers. Given the enormous amount of personal information available through the Internet, a cyberstalker can easily locate private information about a potential victim with a few mouse clicks or key strokes. The fact that cyberstalking does not involve physical contact may create the misperception that it is more benign than physical stalking. This is not necessarily true. As the Internet becomes an ever more integral part of our personal and professional lives, stalkers can take advantage of the ease of communications as well as increased access to personal information. In addition, the ease of use and non-confrontational, impersonal, and sometimes anonymous nature of Internet communications may remove disincentives to cyberstalking. Put another way, whereas a potential stalker may be unwilling or unable to confront a victim in person or on the telephone, he or she may have little hesitation sending harassing or threatening electronic communications to a victim. Finally, as with physical stalking, online harassment and threats may be a prelude to more serious behavior, including physical violence. While there are many similarities between offline and online stalking, the Internet and other communications technologies provide new avenues for stalkers to pursue their victims. A cyberstalker may send repeated, threatening, or harassing messages by the simple push of a button; more sophisticated cyberstalkers use programs to send messages at regular or random intervals without being physically present at the computer terminal. California law enforcement authorities say they have encountered situations where a victim repeatedly receives the message "187" on their pagers - the section of the California Penal Code for murder. In addition, a cyberstalker can dupe other Internet users into harassing or threatening a victim by utilizing Internet bulletin boards or chat rooms. For example, a stalker may post a controversial or enticing message on the board under the name, phone number, or e-mail address of the victim, resulting in subsequent responses being sent to the victim. Each message -- whether from the actual cyberstalker or others -- will have the intended effect on the victim, but the cyberstalker's effort is minimal and the lack of direct contact between the cyberstalker and the victim can make it difficult for law enforcement to identify, locate, and arrest the offender. Law enforcement response: specialized units show promise in combating cyberstalking A growing number of law enforcement agencies are recognizing the serious nature and extent of cyberstalking and taking aggressive action to respond. Some larger metropolitan areas, such as Los Angeles and New York, have seen numerous incidents of cyberstalking and have specialized units available to investigate and prosecute these cases. For example, Los Angeles has developed the Stalking and Threat Assessment Team. This team combines special sections of the police department and district attorney's office to ensure properly trained investigators and prosecutors are available when cyberstalking cases arise. In addition, this specialized unit is given proper resources, such as adequate computer hardware and advanced training, which is essential in investigating and prosecuting these technical cases. Similarly, the New York City Police Department created the Computer Investigation and Technology Unit. This unit provides regular training for police officers and prosecutors regarding the intricacies of cyberstalking investigations and prosecutions. The training includes understanding how chat rooms operate, how to obtain and preserve electronic evidence, and how to draft search warrants and subpoenas. The programs in New York and Los Angeles both ensure that enforcement personnel receive proper training and have adequate resources to combat cyberstalking. Other jurisdictions are also taking steps to combat cyberstalking. One of the critical steps is learning how to trace communications sent over computers and the Internet. Traditional law enforcement techniques for surveillance, investigation, and evidence gathering require modification for use on computer networks and often require the use of unfamiliar legal processes. Law enforcement at all levels must be properly trained to use network investigative techniques and legal process while protecting the privacy of legitimate users of the Internet. These techniques are similar to those used in investigating other types of computer crime. Just as a burglar might leave fingerprints at the scene of a crime, a cyberstalker can leave an "electronic trail" on the web that properly trained law enforcement can follow back to the source. Thus, technological proficiency among both investigators and prosecutors is essential. At present, there are numerous efforts at the federal and state levels that focus solely on high technology crimes. These units do not focus on cyberstalking alone, but they have the necessary expertise in computers and the Internet to assist in the investigation of cyberstalking when it arises. For example, the Federal Bureau of Investigation (FBI) has Computer Crime Squads throughout the country, as well as the National Infrastructure Protection Center in Washington, to ensure cybercrimes are properly investigated. Additionally, they have Computer Analysis and Response Teams to conduct forensics examinations on seized magnetic media. Similarly, in 1996 the Justice Department established the Computer Crime and Intellectual Property Section within the Criminal Division. These units have highly trained personnel who remain on the cutting edge of new technology and investigative techniques. In addition, each U.S. Attorney's office contains experienced computer crime prosecutors. These individuals -- Computer and Telecommunications Coordinators -- assist in the investigation and prosecution of a wide variety of computer crimes, including cyberstalking. In addition, at the state level, several attorneys general have established special divisions that focus on computer crimes. Although high-tech expertise is essential, police and prosecutors have developed other strategies for helping victims of cyberstalking. An Assistant U.S. Attorney reported that in two recent cases of e-mail harassment, he asked an FBI agent to confront the would-be harasser. The agent advised that such behavior might constitute a criminal offense. In both instances, the harassment stopped. Such strategies, however, are no substitute for prosecution under federal or state law in the appropriate circumstances. A critical step in combating cyberstalking is understanding stalking in general. In many instances, cyberstalking is simply another phase in an overall stalking pattern, or it is regular stalking behavior using new, high-technology tools. Thus, strategies and techniques that have been developed to combat stalking in general often can be adapted to cyberstalking situations. Fortunately, many state and local law enforcement agencies have begun to focus on stalking, and some have developed special task forces to deal with this problem. In addition, the Attorney General submits an annual report to Congress entitled "Stalking and Domestic Violence." This report compiles valuable information about what the Department of Justice has learned about stalking and stalkers and is a valuable resource for law enforcement agencies and others. Cyberstalking is expected to increase as computers and the Internet become more popular. Accordingly, law enforcement at all levels must become more sensitive to cyberstalking complaints and devote the necessary training and resources to allow proper investigation and prosecution. By becoming technologically proficient and understanding stalking in general, agencies will be better prepared to respond to cyberstalking incidents in their jurisdictions. In addition, state and local agencies can turn to their local FBI or U.S. Attorney's office for additional technical assistance. Also, computer crime units and domestic violence units should share information and expertise, since many cyberstalking cases will include elements of both computer crime and domestic violence. Finally, law enforcement must become more sensitive to the fear and frustration experienced by cyberstalking victims. Proper training should help in this regard, but law enforcement at all levels should take the next step and place special emphasis on this problem. Computers and the Internet are becoming indispensable parts of America's culture, and cyberstalking is a growing threat. Responding to a victim's complaint by saying "just turn off your computer" is not acceptable. Federal cyberstalking laws Federal law provides a number of important tools that are available to combat cyberstalking. Under 18 U.S.C. 875(c), it is a federal crime, punishable by up to five years in prison and a fine of up to $250,000, to transmit any communication in interstate or foreign commerce containing a threat to injure the person of another. Section 875(c) applies to any communication actually transmitted in interstate or foreign commerce - thus it includes threats transmitted in interstate or foreign commerce via the telephone, e-mail, beepers, or the Internet. Although 18 U.S.C. 875 is an important tool, it is not an all-purpose anti-cyberstalking statute. First, it applies only to communications of actual threats. Thus, it would not apply in a situation where a cyberstalker engaged in a pattern of conduct intended to harass or annoy another (absent some threat). Also, it is not clear that it would apply to situations where a person harasses or terrorizes another by posting messages on a bulletin board or in a chat room encouraging others to harass or annoy another person (as in the California case, discussed infra.). Certain forms of cyberstalking also may be prosecuted under 47 U.S.C. 223. One provision of this statute makes it a federal crime, punishable by up to two years in prison, to use a telephone or telecommunications device to annoy, abuse, harass, or threaten any person at the called number. The statute also requires that the perpetrator not reveal his or her name. See 47 U.S.C. 223(a)(1)(C). Although this statute is broader than 18 U.S.C. 875 -- in that it covers both threats and harassment -- Section 223 applies only to direct communications between the perpetrator and the victim. Thus, it would not reach a cyberstalking situation where a person harasses or terrorizes another person by posting messages on a bulletin board or in a chat room encouraging others to harass or annoy another person. Moreover, Section 223 is only a misdemeanor, punishable by not more than two years in prison. The Interstate Stalking Act, signed into law by President Clinton in 1996, makes it a crime for any person to travel across state lines with the intent to injure or harass another person and, in the course thereof, places that person or a member of that person's family in a reasonable fear of death or serious bodily injury. See 18 U.S.C. 2261A. Although a number of serious stalking cases have been prosecuted under Section 2261A, the requirement that the stalker physically travel across state lines makes it largely inapplicable to cyberstalking cases. Finally, President Clinton signed a bill into law in October 1998 that protects children against online stalking. The statute, 18 U.S.C. 2425, makes it a federal crime to use any means of interstate or foreign commerce (such as a telephone line or the Internet) to knowingly communicate with any person with intent to solicit or entice a child into unlawful sexual activity. While this new statute provides important protections for children, it does not reach harassing phone calls to minors absent a showing of intent to entice or solicit the child for illicit sexual purposes. Thus, although current statutes address some forms of cyberstalking, there are gaps in current federal and state law. As outlined in the Recommendations below, States should review their existing stalking and other statutes to determine whether they address cyberstalking and, if not, expeditiously enact laws that prohibit cyberstalking. Federal legislation also is needed to fill the gaps in current law. While most cyberstalking cases will fall within the jurisdiction of state and local authorities, there are instances - such as serious cyberharassment directed at a victim in another state or involving communications intended to encourage third parties to engage in harassment or threats - where state law is inadequate or where state or local agencies do not have the expertise or the resources to investigate and/or prosecute a sophisticated cyberstalking case. Therefore, federal law should be amended to prohibit the transmission of any communication in interstate or foreign commerce with intent to threaten or harass another person, where such communication places another person in fear of death or bodily injury to themselves or another person. Because of the increased vulnerability of children, the statute should provide for enhanced penalties where the victim is a minor. Such targeted, technology-neutral legislation would fill existing gaps in current federal law, without displacing the primary law enforcement role of state and local authorities and without infringing on First Amendment-protected speech. How You Can Protect Against Cyberstalking - And What To Do If You Are A Victim Prevention Tips Do not share personal information in public spaces anywhere online, nor give it to strangers, including in e-mail or chat rooms. Do not use your real name or nickname as your screen name or user ID. Pick a name that is gender- and age-neutral. And do not post personal information as part of any user profiles. Be extremely cautious about meeting online acquaintances in person. If you choose to meet, do so in a public place and take along a friend. Make sure that your ISP and Internet Relay Chat (IRC) network have an acceptable use policy that prohibits cyberstalking. And if your network fails to respond to your complaints, consider switching to a provider that is more responsive to user complaints. If a situation online becomes hostile, log off or surf elsewhere. If a situation places you in fear, contact a local law enforcement agency. What To Do If You Are Being Cyberstalked If you are receiving unwanted contact, make clear to that person that you would like him or her not to contact you again. Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet system administrators or law enforcement officials. You may want to consider blocking or filtering messages from the harasser. Many e-mail programs such as Eudora and Microsoft Outlook have a filter feature, and software can be easily obtained that will automatically delete e-mails from a particular e-mail address or that contain offensive words. Chat room contact can be blocked as well. Although formats differ, a common chat room command to block someone would be to type: /ignore (without the brackets). However, in some circumstances (such as threats of violence), it may be more appropriate to save the information and contact law enforcement authorities. If harassment continues after you have asked the person to stop, contact the harasser's Internet Service Provider (ISP). Most ISP's have clear policies prohibiting the use of their services to abuse another person. Often, an ISP can try to stop the conduct by direct contact with the stalker or by closing their account. If you receive abusive e-mails, identify the domain (after the "@" sign) and contact that ISP. Most ISP's have an e-mail address such as abuse@(domain name) or postmaster@(domain name) that can be used for complaints. If the ISP has a website, visit it for information on how to file a complaint. Contact your local police department and inform them of the situation in as much detail as possible. In appropriate cases, they may refer the matter to state or federal authorities. If you are afraid of taking action, there are resources available to help you, Contact either: -The National Domestice Violence Hotline, 800-799-SAFE (phone); 800-787-3224 (TDD) -A local women's shelter for advice and support. Credit and reference: http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm
|
| | Thursday, March 30, 2000 - 07:31 pm My E-mail to the LA FBI: Dear LA FBI: I'd like to know whether it is true that you deceived Kristi Feathers into believing that you are actually going to do something about Robert. Considering that Robert knows where Kristi works, I think it would have been much more appropriate to tell her that you don't care (as the Phoenix FBI office did in response to my complaint.) If we have to defend ourselves, just say so. I hear it's under $1,000 to have someone's brains blown out in So Cal. Please respond via E-mail or post at the BayHouse Forum. Sincerely, Christine Baker ------------------------- I included my correspondence with the Phoenix FBI.
|
|
Credit Forum CreditCourt Forum 2003 Credit Suit CreditFactors Order Credit Reports |