|
 |
|
Web Stalkers
Protect yourself from Internet Criminals & Psychopaths
Stephen Andert,
Donald K. Burleson
Retail Price $27.95 /
£17.95
-
Order now and get 30% off!
Only $19.95

|
ISBN 0-9745993-9-5 |
Library of Congress
Number: 2004115996 |
352 pages - Perfect bind
- 9x7 |
PD 305 |
Shelving: Current
Affairs, Adult Non-Fiction |
911 Series # 1 |
More than ever before, crazy psychopaths, criminals and unsavory
stalkers are destroying innocent people's lives. With remarkable
ease, Web stalkers can invade your privacy, steal your identity
and threaten your safety and well-being.
With advice from practicing psychologists, this book is the
accumulated of more than a decade of research and observations and
shows you how to protect your anonymity, hide your personal
information and protect you safety and reputation.
This indispensable book focuses on the actual techniques used by
web stalkers and show how evil and malicious stalkers attack. Best
of all, you see the effective prevention and intervention secrets
and the methods used to bring these people to justice.
Don't be their next victim.
|
|
* See what stalkers can find
out about your credit and court history.
* Understand the techniques used by stalkers to intimidate
you.
* Use proven techniques to protect your anonymity on the web.
* How to report the web stalker to police agencies. |
About the Authors:

Stephen Andert |
|
|
Stephen Andert is a database
administrator for
many years
and has been working with Oracle for 5 years. He has been
working with various different relational databases for over
12 years. He has been a technical reviewer for several Oracle
books from O'Reilly & Associates, authored an article on
SQL*Loader tuning
and has presented at local and international Oracle user group
events.
Stephen is an Oracle8 and Oracle8i Oracle
Certified Professional and is currently serving on the Board
of AZORA, the Arizona Oracle User Group (www.azora.org).
|

Donald Burleson |
Donald
K. Burleson is one of the world’s top Oracle Database experts
with more than 25 years of full-time DBA experience. He
specializes in creating database architectures for very large
online databases and he has worked with some of the world’s
most powerful and complex systems.
A former Adjunct
Professor, Don Burleson has written more than 30 books, published more
than 100 articles in National Magazines, and serves as
Editor-in-Chief of Rampant TechPress. Don is a popular lecturer
and teacher and is a frequent speaker at Oracle OpenWorld and
other international database conferences.
Table of Contents:
Chapter 1 - The Illusion of Anonymity
Privacy on the Web?
Background Investigations
Real-world case: The Shaeffer Murder
Disclosure of Private Information
Disclosure by Proxy
Web Site Responsibility for Data Privacy
Finding Criminal History
A Wealth of Civil Information
Sources of Personal Information
All about Anyone: Just a Mouse-Click Away
Finding Private Medical Information
Tracing E-mail
Using WHOIS & FINGER
Usenet Searches
Government Tools to Reveal Personal
Details
Corporate Anti-Privacy Tools
Protecting Web Privacy
Sanitizing an Online Profile
The Search for Self
Analyze Passwords
Forget Logins
Safely Purchasing Online
Comparison Shopping
All about Cookies
Privacy Enhancements
Vulnerability Analysis
Methods to Maintain Privacy
Dumping a Computer
Chapter 2 - Understanding Web Personalities
Introduction
The Problem of Text-Only Communication
Safety in a Text-only World
The World’s First Emoticon
Web Stalkers
Intelligence and Formal Education
Assessing IQ on the Web
Assessing Personality on the Web
The Wannabe
The Rottweiler
The Baby
The Luddite
The Scientist
The Charger
The Empath
The Zealot
Personality Conflicts on the Web
Chapter 3 - Web Weirdos
The Land of Fruits and Nuts
Social Incompetents and Neurotics
The Pseudo Stalker
Types of Web Weirdos
The Narcissist
The Doper
The Delusional
The Bi-Polar
Deviants on the Web
Sexual Deviants on the Web
Web Addicts
Web Gambling Addicts
Web Pornography Addicts
Looking for Love on the web
Ensuring Safety from Cyber-nuts
Chapter 4 - Web Stalkers
Introduction
What Is Web Stalking?
Technology Enables Web Stalking
The Credible Threat Doctrine
Real World Case: Web Harassment
Arresting the Web Stalker
After Arresting the Web Stalker
Types of Web Stalkers
The Insane Among the Sane
Obsessive Personalities and Web Stalking
Love Obsession Stalking
Erotomaniacs and Web Stalking
Vengeance and Terrorism Stalking
Predatory Web Stalking
Legal Issues on Web Stalking
Recognizing a Stalker
Demographics of Web Stalkers
The Scope of Web Stalking
The Motivations of Web Stalkers
The Web Stalking Progression
E-mail Harassment and Web Stalking
What an Individual Can Do
Preventing Web Stalking
Do Not Threaten the Web Stalker
Always Stay Anonymous on the Web
Do Not Reveal Personal Demographics
Do Not Accidentally Reveal Personal Identity
Report the Web Stalker
Chapter 5 - All About Cybercrime
Introduction
Internet Scams
Real-World Case: Nigerian Scam
Hackers on the Web
Outside-In Hacker Attacks
Web Privacy Legislation
The Problem of the Wireless Web
Cyber Law and Harassment
Threats over the Web
Internet Harassment
Intentional Infliction of Emotional Distress
Unsolicited E-mail Crimes
Libel and Defamation on the Web
Libel and the Internet
Malice and Libel
Website Liability for Cyber-Libel
The Judgment-Proof Libeler
Challenging the Defamers
Jurisdiction and Internet Law
Web Stalkers
Significant Contact and Personal Jurisdiction
Fairness and Substantial Justice with Jurisdiction
Real-World Case: Web Deception
Real-World Case: Cyber-libel and Tortuous Interference
Invasion of Privacy
Identity Crimes
Tortuous Interference
Web Conspiracies
Criminal Conspiracies on the Web
Conspiracies Against One’s Civil Rights
Illegal Websites and Cybercrime
Website Laws
Obscenity on the Web
Child Pornography
Sexual Addiction and the Internet
Cyber Attacks and Terrorism
Preventing Cyber attacks
Reporting Web Crimes to Law Enforcement
Victims’ Rights and Cybercrimes
Local, Regional or International Crimes
IC3 and Cybercrime
Enforcement of Internet Crime Statutes
Penalties for Cyber Criminals
Cybercrooks and Security Assessment Tools
|
Chapter 6 - Cyber Theft
Introduction
Web Page Hijacking
Copyrights and Cyberspace
Music and the Web
Software Licensing and the Internet
E-Books
Plagiarism and the Web Revolution
The Semantics of Plagiarism
The Epidemic of Web Content Theft
Detecting Plagiarism
A Question of Honor
Punishment for Plagiarists: Real World Case
Laws Against Plagiarism
Cybersquatting
Deceptive Domain Names: Real World Case -
Chapter 7 - Internet Scams
Deception at Work
The Horrors of Internet Fraud
Inside the World of the Web Scammer
All about eCommerce
The Risks of eCommerce
The Upside of eCommerce
Intelligent eCommerce
All about eBay
Shilling Scams
The Cut-and-run scam
Buyer fraud
Real-world case: Online sales fraud
Web Charity Scams
Evaluating Charities on the Web
The Auto Donation scam
All about Online Banking
Real-world case: PayPal Scam
Web Sales Scams
The Nigerian 419 Scams
Real-World case: The Nigerian Scam Murder
Get Rich Quick Scams
Help Me Steal Scams
The Overpayment Scam
Phishing Scams
Mouse Trapping
Hoaxes
Real World Case: Internet Consumer Scams
The DBLearning Site Scam
Web Resources for Scam Victims
Using the Wayback Machine
Chpater 8 - Identity Theft
Identity Theft
Physical Identity Theft
Lost ID Cards
Dumpster Diving
Web Stalkers
Social Engineering Techniques for Identity Theft
Phony ATMs and Identity Theft
Computer-Assisted Identity Theft
Virtual Identity Theft
Network Sniffing Tools
E-mail Scams for Identity Theft
Web Searches for Identity Theft
Fake Websites and Identity Theft
Phishing for Identity
War-Driving and Identity Theft
Preventing Identity Theft
Recognizing Identity Theft
Recovering a Stolen Identity
Legal Protection Against Identity Theft
Chapter 9 - Self Protection on the Web
Online Security Measures
The Appeal of Wireless
Risks of Wireless Communications
Encryption
Rewards of Wireless Communications
What is a Firewall?
Types of Firewalls
Hardware Firewalls
Software Firewalls
Recommendations for Firewall Safety
Chapter 10 - Protecting Children on the Web
Real-World Case - The Death of Christina
Danger of Online Relationships
The Dangers of Chat Rooms
Games Children Play
Psychological Effects of Computer Games
Appropriate Use of Search Engines
Protecting Kids with Monitoring and Filtering
Software
Using ISP Filters
Knowing When a Child Is at Risk
Conclusion
Chapter 11 - Internet Spies
Spying and Marketing, Who is in Their Sights
Discovering the Secrets of Spyware
The Downside of Spyware
The Spyware in the Middle
Detecting Spyware
Free Can be Better
Removing Spyware
Spyware and the Law
Privacy Breeches on the PC
Discovering the Secrets of Adware
The Downside of Adware
Protection from Web Spies
Chapter 12 - Virus Attacks
Exposure to Viruses
What Is a Virus?
When Worms Attack
When the Trojan Horse Rolls Through the Gate
Viruses and Personal Safety
Viruses: Who’s Behind Them
Virus Prevention Software
Software Best Practices
Remedies for Virus Attacks
Chapter 13 - Spam, Spam, Spam, Spam
Spam is in the Eye of the Beholder
Why Does Spam Exist?
Fighting Spam
Spamboy
Reasons to Ignore Spam
Safely Peeking at Spam
Tools to Avoid Spam
An Alternative View of Spammers
Learning More about Spam
A Case Study in Spam
About Stephen Andert
About Don Burleson
|
|
|
Index Topics:
A
ACPA
Active Server Pages
ADA
Ad-Aware
Adware
aggravated identity theft
Agoraphobia
American Psychological Association
Americans with Disabilities Act
Anonymizer Inc.
Anticybersquatting Consumer Protection Act
antivirus program
Archie Bunkers
Artificial Intelligence
Ask Jeeves
B
background investigations
Bayesian Statistics
BBB Wise Giving Alliance
Bestiality
Better Business Bureau
blogs
Brick-and-Mortar
brute-force attack
Buffer Overflow Attacks
bugs
bulk e-mail
buyer fraud
C
CAN-SPAM Act of
Carl Rogers
Carnivore
Catatonic Schizophrenia
caveat emptor
Chamber of Commerce
Charities
charity fraud
Chat rooms
Child Molesters
child pornography
Civil Rights
Civil Rights Act
Code Red worm
Comet Cursor
Communications Decency Act
Computer Crimes Unit
Computer Fraud and Abuse Act
computer games
Conspiracies
Consumer Reports
Controlling the Assault of Non-Solicited Pornography and
Marketing Act of
cookie
Cookie Monster
Coolminer
credible threat
credit card cramming
credit card fraud
credit fixer
credit reports
cut-and-run scam
Cyber Patrol
Cyber Snoop
Cybercrime
Cyberlaw
cyber-libel
CyberSitter
cybersquatting
Cyberstalking
cyber-terrorism
D
demographics
Denial of Service Attack
dictionary attack
Digital Millennium Copyright Act
Dinks
Disclosure of embarrassing facts
Do Not Call
domestic violence
DragonWare Suite
Dumpster diving
E
e-books
e-Commerce
Electronic books
Electronic Privacy Information Center
Emoticon
emoticons
Emotional Support Animals
encrypted
Encryption
EPIC
Equifax
e-tailers
Experian
F
Fair Credit Reporting Act
fake web site
false light
False publicity
FBI
FDIC
Federal Bureau of Investigation
Federal Deposit Insurance Corporation
Fighting Words
File Transfer Protocol
FINGER
firewalls
First Amendment
forum shopping
Fraud
freeware
FTP
G
gender-blurring
Genealogy
GLBA
Google
Google Groups
Gramm Leach Bliley Act
|
H
Harassment
Health Insurance Portability and Accountability Act of
Hebephrenic Schizophrenia
HIPAA
honeypot
Honor Code
https
I
IANA
IC
ICDRI
identity theft
Identity Theft Penalty Enhancement Act of
Identity Theft Protector™
ILOVEYOU
impersonation
Information Technology Act
Injection Threats
Instant Messenger
Integrity Online
Intentional Infliction of Emotional Distress
International Center for Disability Resources on the Internet
Internet Addiction
Internet Assigned Numbers Authority
Internet auction fraud
Internet Crime Complaint Center
Internet dating
Internet Fraud Complaint Center
Internet impersonation
Internet pornography
Internet search engines
Internet Service Providers
Internet Spyware Prevention Act
InterNIC
Interpol
Intrusion on solitude
IP address
IQ
I-SPY
L
Lanham Act
libel
Limited Purpose Public Figure
love-obsessed stalker
M
MailBlocks
Malicious Intent
Man-in-the Middle Attacks
Massachusetts Institute of Technology
Matador
McAfee Inc.
Medical records
Melissa virus
MindGuard
minimum contacts
Minnesota Multiphasic Personality Inventory
MIT
MMPI
modified attack
monitoring software
MOSAIC Threat Assessment Systems
mouse trap
multilevel marketing
Mutilators
N
name servers
National Center for Victims of Crime
National Credit Union Association
National Credit Union Share Insurance Fund
National Federation for the Blind
National Institute of Justice
National Violence Against Women Survey
NCUA
NCUSIF
NCVC
Necrophiliacs
need creation
Net Nanny
netizen
Network sniffing
Network Solutions
newsgroups
NFB
Nigerian scam
No Password Disabling
Norton Internet Security
O
Obscenity
Obsessive Compulsive
on-line banking
opt-in spam
P
Packeteer
pagejacker
pagejacking
Paranoid Schizophrenia
password
Pathological Internet Usage
pattern of behavior
PAXWAY
PDA
pedophile
Personal Digital Assistant
phishing
PHP Hypertext Protocol
PIU
plagiarism
Point-Of-Sale
political terror stalker
pornography
POS
predatory stalker
Proland Software
Protection of Children from Sexual Predators Act of
psychological abuse
public records
pyramid schemes
|
Q
Qurb
R
rebounders
Reckless Disregard for Truth
Recording Industry Association of America
RIAA
Riverdeep Interactive Learning
Root Kit Attacks
S
Safe Access
Sam Spade
Sarbanes Oxley Act
Scambaiter
server logs
Service Set IDentifier
shill bidders
shill bidding
Shilling
Sigmund Freud
SIIA
simple obsession
Slammer worm
slander
smiley’s
social engineering
Social Security Death Index
social security number
Software & Information Industry Association
software licenses
Sophos Inc
SOX
spam
Spam Arrest
spam filter
SpamBayes
spamboy
SpamEater
SpamInspector
Spy Sweeper
Spybot Search & Destroy
spyware
SSDI
SSID
stalking
Stalking in America
Stalking Resource Center
stranger-danger
Symantic
T
TCP/IP
tcpdump
terror stalker
The Baby
The Charger
The Empath
The Luddite
The Rottweiler
The Wannabe
The Zealot
Tipping the User ID
Tortuous interference
TransUnion
Trend Micro Inc.
Trojan Horse
Trojan Horse Access
troll
U
UCE
Undifferentiated Schizophrenia
Unified Audit Reporting Interface
Un-requested Commercial E-Mail
Urban Princesses
Usenet
V
veiled threat
vengeance stalking
Virus Attacks
Voter registration
W
WM/Assilem.A
war dialing
war-driving
Wayback Machine
Web cramming
Weblogs
whois
WHOIS
Windows Update
wireless network
work-at-home scams
World Wide Scam
worm
Y
Yuppies |
Reviews:
"There is an appointed time for everything. And
there is a time.", December 6, 2005
"Web Stalkers" is a true revelation for anyone seeking to understand
the phenomena, detailing how any malefactor can
become empowered by conducting false light
defamation campaigns and web conspiracies through
online forums, blogs and more.
Recently a group of fanatics were targeting
individuals whom they felt deserved to be vanquished
online and so they set out with invasions of
privacy, web conspiracies and false light defamation
campaigns disguised as free speech and parody in
interactive chat rooms and forums. It took some time
but after years of deeply rooted contempt, false
light defamation and libel they accomplished their
goal.
For the first time the stratagem behind this kind of
treachery is exposed. And although justice may never
be served, it is all the more relevant that pause be
given to recognize how embarrassingly simple it is
to seduce the average person into conspiring,
committing and justifying unconscionable, shameful
and criminal acts.
As much as "Web Stalkers" is vindication for the
victims emerging from this new frontier in
communications and a guide for the future and
prevention, it also serves a double role as a
deterrent for would be web conspirators and stalkers
who may not be aware that they are also would be
criminals as well. Unfortunately for far too many
normally average everyday people it is too late...
The anonymity and the immediacy of this new form of
communication has brought out the worst in them.
At least with a book like "Web Stalkers" there is
some closure and vindication for those who have been
searching for this information for years. After
reading it, the criminal wrongdoing that has always
been suspect of being present online but never
really clearly defined, is finally revealed. There
is no second-guessing any of it anymore.
As for the new age of criminals, "There is an
appointed time for everything. And there is a time."
|
|
useful warnings, August 11, 2005
Andert gives a good, understandable description of the dangers on the
Internet. As the Web becomes more heavily used,
it attracts attackers or predators, who often
look for novice, unwary users. The book explains
how people often let down their guards when
conversing with strangers on the net. Where this
communication might be via email, Instant
Messaging or other modalities. It has been
observed that the anonymous, remote nature leads
some people to confide things that they would
not to a stranger they met in person.
Anyway, Andert offers practical suggestions to
limit your exposure through such inadvertant
actions. You are also warned to beware of giving
up too much personal data on some purported web
site, or in a response to an email. The data
might be sufficient, possibly in conjunction
with other facts that could be amassed about
you, for someone to forge your electronic
identity.
Perhaps, though, Andert could have omitted the
"911" from the title. Very US-centric. Other
countries don't use this as the emergency phone
number. It detracts from the global appeal of
this book. |
|
Errata and
Enhancements
 |
|

Copyright ©
1996 -2017 by Burleson. All rights reserved.
Oracle® is the registered trademark of Oracle
Corporation. SQL Server® is the registered trademark of Microsoft
Corporation. Many of the designations used by computer vendors to distinguish their
products are claimed as Trademarks
|
|