Skinning cats. . .

October 28, 2008

From GeoffreyPlitt. . . There’s always more than one way: Gmail modes. Perhaps if you are inside some firewall and unable to break out, one of these will work for you.

And don’t take this as encouragement…

Israeli UZI Model B, 9mm
Originally uploaded by barjackAlcohol and Driving.

Steroids and Olympic sports.

Children and Uzi sub-machine guns

The Rev. Anthony C. Paige of Norfolk has recently come out in support of state senator Louise Lucas.

Quite frankly, I don’t know of any perfect public servant. If Lucas made some mistakes in trying to bring positive economic development to Portsmouth, that’s correctable. But please don’t destroy her reputation as a public servant.

Moreover, if we are going to use a sharp scalpel on Lucas, then why not be evenhanded about it? She is not the only elected official who has benefited from economic development and will not be the last. In my opinion, that’s not the worst thing a public official can do — when they are open with it.

Er, ah, sir, that’s the point. She wasn’t open about it.

From yesterday’s editorial page in the Virginian Pilot, we read what they are thinking.

When state Sen. Louise Lucas first proposed building a hotel and conference center in Portsmouth, she argued in a letter to this page that her involvement in the project would ensure “that openness and transparency prevail.” Since then, however, she has been far from open and transparent in her dealings with city officials and taxpayers and even with investors in the project.

Even and admission that she messed up would go pretty darn far… although, as every day passes with explanations and rationalities from the Lucas camp, the less helpful even a full admission of malfeasance and a request for pardon by the public will not go as far as it would have earlier.Technology is becoming more and more a Predator’s Paradise and Safe HavenKnowledge enables power and with it we Can Help Protect Ourselves and the Ones We LoveThere are dozens of new methods and techniques being developed each day to enhance our technology.   The internet continues to be a tool that we rely on daily as well as a tool that enables predators to stalk, threaten and terrorize victims.  The majority of these victims being innocent children.75 % or more local police departments are not even aware of half of the technology threats that exist. Yet these threats are easily accessible and available to offenders (as well as all members of the general public). This fact alone represents a significant danger. When the Officers who are in charge of our safeties are not aware of the threats/dangers/risks  that can harm our children as well as ourselves, how are we supposed to feel safe and protect ourselves and/or our families?For the past two years, I’ve been a victim of many different forms of what I like to refer to as “technological terror”. My ex husband is “computer savvy” .  I have made dozens of police reports to 10 plus police departments regarding threatening text messages, calls, emails, letters and the fact that my ex husband knew my whereabouts 24/7. I’ve reported his criminal actions to police departments in the states of NH,CT, CA, MA and FL.  The majority have informed me that they did not have the resources to trace emails or calls.  One Police Department in NH did not even know how to handle and/or investigate most of the threats my ex husband committed against me because his threats were (1) technology based and (2) their department did not have the knowledge/education/resources  on computer and/or technology based crimes.  Before this happened to me, I always had assumed that each police department was similiar to the next (minus the size/# of Police Officers) But what was I supposed to do?  They are the only resource my daughter and I have/had to obtain justice and safety. When it came to the day my ex finally was brought infront of the criminal court in NH for his crimes, the State had very little supporting evidence because of the reasons I have listed above and the State had to heavily rely on witness testimony.As time went by and the threats grew more frequent and violent, I  was forced to spend money to hire private investigators and outside services in effort to obtain the answers and provide alternative methods to keep my daughter and myself safe. The unknown is not only confusing and frustrating, but it is beyond terrifying. Knowledge alone is power and can help provide a person comfort and/or safety.   My question is why are law enforcement officials not required to stay up to date on the consistently increasing technological threats that jeopardize the safety and well being of our children and us????A two hour seminar once per year or even a memo/ at a glance sheet that was faxed/mailed to each police department informing and updating officers on this subject would be a positive.  Just this alone would be 100 times better than what is in place now.Police Officers lack of knowledge and/or ability  ends up causing distrust and anger factors to be formed by those they swore to protect and serve.One of the reasons we pay taxes is to benefit from the safeties that our local state/city/town law enforcement agencies provide us and our families. It is not like the average citizen has access to the FBI or endless money to hire outside agencies to investigate crimes committed against them.  Technological Threats such as key logger computer viruses, proxy servers, anonymous email services, throw away phones, 811.com/anonymous text messages services, spoof cards and other technology are  currently being used today by criminals to harm us.  The advancements are in this area are strengthening and enabling offenders to carry out their violent crimes more frequently and secretly. It is horrifying enough to be stalked/abused/victimized but what is worse is when there is technology that enables the abusers to hide from the law and get away with the crimes they’ve committed against you.For example with the spoof card. You can put in any person’s phone number .  You can select the change of voice option. Realistic Example:  The offender calls their selected victim( your child) and informs your child that it’s ” Officer Bob and that there’s been an emergency with their mother”. Officer Bob tells your child that he will have an officer in an unmarked police car pick them up at their house and take them to their mother.  Your child looks at the caller ID and see’s their  town’s police department phone # and name on the caller ID.  So what does your child do, they jump into thePerpetrator/Officer Bob’s car when it arrives.  Why wouldn’t they?  The police department’s phone number came up on the caller ID and that alone is verification right.  Well sadly since the spoof card that is no longer the case.What is Spoof Card?Spoof Card offers the ability to change what someone sees on their caller ID display when they receive a phone call. Simply dial the toll free number and then your PIN. You’ll then be prompted to enter the destination number followed by the phone number to appear on caller ID. It’s that easy!Is spoof card legal?Yes. Each of the capabilities of Spoof Card is legal in the US. However, certain uses may be illegal depending on which state you are calling from  What other features does Spoof Card offer?You have the ability to change your voice to a Male or Female. If you do choose to change your voice, the person whom you call will hear your transformed voice in real-time. We also offer the option to record your conversation, which can later be retrieved by logging-in to the control panel or calling the toll-free access number from any phone. There is no extra cost for these features and they are included with your purchase.Can calls be traced back to me?Your financial, personal and call records are all confidential and are untraceable.Can any number be used to show up on the Caller ID?Any 10 digit number can be used. Not only will the number show up but also the Name registered for that number would automatically appear.What number will show up on the phone bill of the person whom I call?Whatever number you enter as the spoof number will show up on the bill of the person you called. They won’t ever see your actual phone number!

Spoof Card Services: Cost=$ 10.00-$ 29.00

http://www.itellas.comhttp://www.telespoof.comhttp://www.phonegangster.comhttp://www.spoofcard.comhttp://www.rootsecure.net

Polygraph Phone Services: Cost=$10.00-$ 20.00

http://www.liarcard.com/ technology.phphttp://www.officialliarcard. comhttp://www.stumbleupon.com/ tag/liar-card http://www.liarcardreview. com/2008/02/17/liarcard- review-does-liarcard-really- work

Anonymous Text Messaging Services: Cost=FREE

http://www.anontxt.comwww.811.comhttp://www.txtemnow.comhttp://www.fakemytext.comhttp://digg.com/software/Send_ Anonymous_Text_Messageswww.3jam.com/?=free_sms_text

Text for free advertisement on their webpage below -http://textforfree.net
Here at Text For Free, we know that you are tired of paying text messaging fees. That’s why you can now send free text messages to almost any USA cell phone provider. Its 100% free texting, with no catch! You can even prank your friends because we offer anonymous text messaging, which means that your friends will never know who sent them the text message! Text For Free offers spam free text messaging, meaning we will never send you unwanted text messages or share your cell number with anybody. What are you waiting for? Stop spending and start texting for free.
Key logger Computer Viruses/Program/Services: Cost= $ 0-$ 50

http://www.onguardonline.gov/ topics/spyware.aspxhttp://en.wikipedia.org/wiki/ Keystroke_logginghttp://searchsecurity. techtarget.com/sDefinition/0,, sid14_gci962518,00.htmlA key logger sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard. As a hardware device, a keylogger is a small battery-sized plug that serves as a connector between the user’s keyboard and computer. Because the device resembles an ordinary keyboard plug, it is relatively easy for someone who wants to monitor a user’s behavior to physically hide such a device “in plain sight.” (It also helps that most workstation keyboards plug into the back of the computer.) As the user types, the device collects each keystroke and saves it as text in its own miniature hard drive. At a later point in time, the person who installed the key logger must return and physically remove the device in order to access the information the device has gathered.A keylogger program does not require physical access to the user’s computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a root kit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.Although keylogger programs are promoted for benign purposes like allowing parents to monitor their children’s whereabouts on the Internet, most privacy advocates agree that the potential for abuse is so great that legislation should be enacted to clearly make the unauthorized use of key loggers a criminal offense.http://www.widestep.com/http://www.refog.com/ keyloggers.htmlhttp://www.mykeylogger.comhttp://www.canadiancontent. net/tech/downloads/Keyloggers. htmlwww.blazingtools.comwww.theperfectkeylogger.comwww.actualspy.comwww.waresight.comwww.x-pcsoft.com

Disposable=Throw Away Phones: Cost = $ 10-$ 20

You pay cash for them at your local convenient store. During the phone set up you can enter in any name/information that you want http://administratosphere. wordpress.com/2007/08/01/ throw-away-phone-numbers-for- privacyhttp://pcworld.about.com/news/ Oct182002id106116.htmhttp://www.allbusiness.com/ technology/telecommunications- phone-systems/678516-1.htmlwww.walmart.comwww.target.com

Anonymous Email Services:         Cost=Free

Usually, when you send an email it is neither private nor anonymous. Everybody can read it, and everybody can find out it was you who sent it. If you want or need to send an email message anonymously, there are several strategies you can employ, though. Find out how to send email in anonymity with these tips, tricks, instructions and how to.http://email.about.com/od/ anonymousemail/Send_Anonymous_ Email_Messages.htmhttp://www.theanonymousemail. comhttps://www.anonymousspeech. com/default.aspxhttp://www.sendanonymousemail. nethttp://www.sharpmail.co.ukhttp://www.advicebox.comhttp://www.guerrillamail.comwww.webcrawler.comhttp://www.theanonymousemail. com

Anonymous email’s advertisement on their web page belowFree anonymous email and private email, private label email
Send free anonymous emails easily! If you’re looking for your own private anonymous email account, you’ve found it a TheAnonymousEmail.com.
Proxy Servers: Cost= $ 0-$ 30

Proxy servers are good and bad because(1) you can protect your location but (2) so can offendershttp://en.wikipedia.org/wiki/ Proxy_serverIn computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client’s request or the server’s response, and sometimes it may serve the request without contacting the specified server. In this case, it would ‘cache’ the first request to the remote server, so it could save the information for later, and make everything as fast as possible.A proxy server can be placed in the user’s local computer or at various points between the user and the destination servers or the Internet.www.maskmyip.comwww.hide-my-ip.comwww.hideyouripaddress.nethttp://www.missingkids.com/en_ US/documents/sex-offender-map. pdf

The number of Registered sex offenders in the United States
(Note: This number only represents the individuals who were caught)=664,731
The chart below represents the number of registered sex offenders per state
Alabama 10,177 Illinois 19,998 Missouri 7,152 Oregon 14,800 Wisconsin 20,359
Alaska 3,233 Indiana 9,722 Montana 14,586 Pennsylvania 9,698 Wyoming 2,542
Arizona 14,481 Iowa 5,178 Nebraska 2,814 Rhode Island 1,686
Arkansas 8,377 Kansas 6,391 Nevada 6,162 South Carolina 10,877
California 114,691 Kentucky 7,072 New Hampshire 3,970 South Dakota 5,178
Colorado 10,196 Louisiana 7,988 New Jersey 12,185 Tennessee 11,832
Connecticut 5,068 Maine 2,159 New Mexico 2,342 Texas 53,911
Delaware 3,528 Maryland 4,688 New York 27,192 Utah 6,431
Florida 49,419 Massachusetts 10,507 North Carolina 11,750 Vermont 2,486
Georgia 15,910 Michigan 44,228 North Dakota 1,175 Virginia 15,189
Hawaii 2,527 Minnesota 14,586 Ohio 18,098 Washington 20,133
Idaho 5,178 Mississippi 5,059 Oklahoma 10,420 West Virginia 2,821

Important Information for Parents to review:http://www.missingkids.com/en_ US/publications/NC167.pdf

Tip to help you stay safe: Cost = FREE

http://www.ic3.gov/default. aspxhttp://www.ic3.gov/media/IC3- flyer.pdfhttp://www.ic3.gov/media/IC3- Poster.pdfhttp://onguardonline.govThe Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA).IC3’s mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, local and international level, IC3 provides a central referral mechanism for complaints involving Internet related crimes.http://www.usdoj.gov/criminal/ cybercrime/reporting.htmhttp://www. connectwithyourkids.org/http://www. connectwithyourkids.org/NHAG- Safety-Brochure-parents.pdfhttp://www. connectwithyourkids.org/NHAG- Safety-Brochure-teens.pdfhttp://www.fbi.gov/ publications/pguide/pguidee. htmhttp://www.fbi.gov/ cyberinvest/protect_online.htmhttp://www.fbi.gov/page2/ page2index/cyber.htmhttp://www.fbi.gov/ cyberinvest/escams.htmhttp://www.ftc.gov/bcp/edu/ pubs/consumer/alerts/alt132. shtmhttp://www.fbi.gov/ cyberinvest/cyberhome.htmhttp://www.onguardonline.gov/ topics/phishing.aspxhttp://www. lookstoogoodtobetrue.com/

Computer Spyware and/or Virus Programs to Help You Protect your Computer:

Don’t forget you need both a spyware and virus program/protection software http://en.wikipedia.org/wiki/ Spy_SweeperSpy Sweeper is proprietary software sold by Webroot Software, which detects and removes spyware, and viruses (with optional Anti Virus component) on personal computers that run Microsoft Windows. www.webroot.com             Cost=$ 30 (the only spy sweeper I have found that works against key loggers)http://www.pcworld.com/ reviews/product/30428/review/ spysweeper_55.html

Trace Emails: Cost=Free

http://en.wikipedia.org/wiki/ IP_addressAn Internet Protocol (IP) address is a numerical identification (logical address) that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its nodes.[1] Although IP addresses are stored as binary numbers, they are usually displayed in human-readable notations, such as 192.168.100.1 (for IPv4), and 2001:db8:0:1234:0:567:1:1 (for IPv6). The role of the IP address has been characterized as follows: “A name indicates what we seek. An address indicates where it is. A route indicates how to get there.” [2]http://whatismyipaddress.comhttp://visualroute.visualware. comhttp://www.ip-adress.comhttp://network-tools.comIn order to improve our safety and our children’s safety, we need to let our State Representatives know how important it is that our local police departments and their officers are educated on Internet and Technology Base Crimes.  Do not assume your local police departments knows because I can tell from firsthand experience that MOST DON’T.Positive Change can only come in numbers, education and our voices.It is important to be pro active vs. reactive. It takes less than 10 minutes to send an email or place a letter in the mail to your local state representative to request that a law/policy is put into place, that requires police officers to stay educated on technological crimes.It also takes less than 10 minutes to have your child abducted or for you and/or your child to become a victim of a violent crime.

CT State Representatives Website: http://www.cga.ct.gov./maps/ townlist.asp
CT Attorney General-Richard Blumenthal Website: http://www.ct.gov/ag/site
55 Elm Street
Hartford, CT 06141-0120
Phone: 860-808-5318
FAX: 860-808-5387 Email attorney.general@po.state.ct. us
CT-  Governor Jodi Rell Website: http://www.ct.gov
State Capitol
210 Capitol Avenue
Hartford, CT 6106
Phone: 860-566-4840 Email: Governor.Rell@po.state.ct.us
MA State Representatives Website: www.mass.gov/legis/memmenuh. htm
MA Attorney General- Martha Coaxley Email: ago@state.ma.us.
One Ashburton Place Website: www.mass.gov/ag
Boston, MA 02108
Phone: (617) 727-2200
TTY: (617) 727-4765
MA Governor-Deval Patrick Website www.mass.gov
Massachusetts State House
Office of the Lt. Governor
Room 360
Boston, MA 02133
(888)-870-7770
NH Attorney General- Kelly Ayotte Website: http://doj.nh.gov
33 Capitol Street
Concord, NH 03301
Telephone (603) 271-3658
NH Governor- John Lynch Website: http://governor.nh.gov
State House
25 Capitol Street Email: http://www4.egov.nh.gov/ governor/goveforms/comments. asp
Concord, NH 03301
(603)271-2121
NH State Representatives Website: www.gencourt.state.nh.us/ house/default.htm