Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI
Stick’em with the pointy end
Virtual and not so Virtual Space
Be Still my Bleeding Heart …
The Never-ending Privacy Battle
The Many Sides of Bitcoin
Cyber Jihadists
Hacker Gangs
The New Old War
The Sacred Executioner
Scripting Aphrodites
Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI I recently purchased the Cirago USB Bluetooth/Wifi combo to use with my raspberry pi. All things considered, I am quite pleased. Being reasonably versed in google-fu, helped, of course. Since I want the freedom to do some mobile tinkering, I need to access the pi sans a lan. That, and my latest wild hair project […]
Stick’em with the pointy end Since I have been spending a great deal of my time playing in the field of 3D design and printing, I have only recently stumbled upon, and had time to read, “Privacy for Me and Not for Thee,” penned by Catherine A. Fitzpatrick, a human rights activist whom I first encountered in the virtual world […]
Virtual and not so Virtual Space Not long ago, someone asked if I liked 3D printing better than virtual worlds. The short answer is, equally but differently.
Be Still my Bleeding Heart … “Secure web servers are the equivalent of heavy armored cars. The problem is, they are being used to transfer rolls of coins and checks written in crayon by people on park benches to merchants doing business in cardboard boxes from beneath highway bridges. Further, the roads are subject to random detours, anyone with a screwdriver […]
The Never-ending Privacy Battle This brings me back to the Hundredpercent American. To some extent he is a pet of mine. I have always rather liked him, because he has some promising qualities. For instance, he has enormous hospitality. I used to feel personally complimented by the amazing warm-hearted hospitality showered on me by Americans. […] When I realized […]
The Many Sides of Bitcoin Pariah, darling, or somewhere in between. Bitcoin has continued to linger in the daily media spotlight since the shuttering of darknet’s black-market drug bazaar, Silk Road, and the subsequent announcement of the arrest of its alleged owner, Ross William Ulbricht (aka DPR), on October 2, 2013. Media mavens have long cast bitcoin as a sort […]
Cyber Jihadists “We’re facing a very great threat of loosely-coupled, organizational networks that increasingly rely on IT infrastructure to coordinate their movements and recruit young disenfranchised, apathetic guys as suicidal pawns in a sophisticated, dispersed movement. (…)” (AHM, Usenet, September 21, 2001)
Hacker Gangs Meet Jim Script Kiddie (skiddie). He is the guy (usually in his early to mid teens) who comes into a hacker forum, asking inane questions like, “how can I be a hacker?” He also tends to over-indulge in “hacker speak” making him look pretty much like a moron to seasoned (and not so) computer netizens.
The New Old War In 1956, FBI Director, J. Edgar Hoover initiated a program, code-named COINTELPRO (counter intelligence program) ushering in what would become the mainstay for how intelligence communities dealt with domesitic affairs. The sole directive of this program was “to expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of various dissidents and their leaders.
The Sacred Executioner In his book, “The Sacred Executioner,” Hyam Maccoby notes: “A figure in mythology that has received little attention is that of the Sacred Executioner. […] By taking the blame for the slaying, he is performing a great service to society, for not only does he perform the deed, but he takes upon himself the blame […]
Scripting Aphrodites On Wednesday, April 13, 2006, 10-year-old Jamie Rose Bolin was reported missing by her father. Investigators thought she may have been abducted by someone she met online. Oklahoma law enforcement suspected her abductor might be heading just across the border to Texas and requested Texas issue an Amber alert.
image Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI
image Stick’em with the pointy end
image Virtual and not so Virtual Space
image Be Still my Bleeding Heart …
image The Never-ending Privacy Battle
image The Many Sides of Bitcoin
image Cyber Jihadists
image Hacker Gangs
image The New Old War
image The Sacred Executioner
image Scripting Aphrodites

Highway Hazards

Seventeen year old Kehaulani Omakalapua Roberts of Eureka, California disappeared on January 26th, 2006. Police found her in Fremont, California, with a man she met on myspace. She was safely returned home and no charges were pressed. Omakalapua was lucky.

Fifteen year old Kayla Reed of Livermore, California was reported missing on December 1st, 2005. Kalyas decomposed remains were found in the Delta-Mendota Canal in San Joaquin County. Her mother believed she was attempting to rendezvous with someone she met online. Kaylas case remains unsolved. Twenty-seven year old Josie Brown was reported missing on December 29th, 2005. Her killer was a man she met on myspace. Fourteen year old Judy Cajuste was reported missing on January 12th, 2006. Her strangled body was found a day later in a trash bin in Weequahic Park in Newark, New Jersey. Investigators believe she may have been killed by someone she met on myspace. Her case remains unsolved. These are but a few headlines of the past month. Sadly, as with the dangerous stretch of highway that is largely ignored until enough people are killed or maimed, we seem to have reached critical mass.

Online predation has been a long-standing problem. Yet, it has gone largely unnoticed by mainstream society. Until now. This is in part due to perception and in part due to increased online activity. Additionally, prior to myspace, livejournal, and the various online journaling communities, the victims were faceless. Sure, we heard about the chat rooms such as AOL and yahoo, though victims pictures, much less their very own words, were rarely if ever publicly available. While law enforcement was setting up stings, John Q. Public may not have been aware. That is, unless the outcome was considered to be newsworthy enough to make the headlines. Among the non-headlines were Brandon Candiano, of Hammond, Indiana, who was recently convicted for using the Internet to prey on his young victims. And Christopher Lance Cobb was indicted last year for using the Internet to prey upon teenaged girls. He is but one of the four who were indicted.

Then and now. There was the mass child pornography sting a few years back. At the time, Parry Aftab, of Cyber Angels–whose interest in cyberstalking arose as a result of the Woodside Literary Agency case–was attempting to educate people with regard to online predators. That was in 2001. Prior to that and sometime in 1999, the FBI released a report on cyberstalking, detailing precautions for protecting against online predators. Their advice came then, as it does now–in response to the growing problem of online predators and peoples lack of understanding when it came to using the Internet. Jane Hitchcock, herself a cyberstalking victim, was blogging about this in 2000. Senator John Loudon of Missouri has propsed HB1672, in hopes of catching “would-be child molesters.” Law enforcement in Middletown, Connecticut are investigating a series of sexual assault incidents involving online predators and the Jacksonville, Mississippi Department of Justice is investigating cyberstalking cases. A new teens-only community was launched last week. The founders plan to enforce the teen-only rule and prosecute adults who are found to have registered as teens.

The above is but a snapshot to demonstrate the ways in which people have rallied to combat online predation. Effectively fighting it however will not be easy. Motives are much harder to guage sans body language. In a sense, society will need to learn new rules for communicating, for identifying and protecting against danger. Liz Ditz provides some tips for teen blogging that are worth a read regardless of your age. As with the cautions put forth decades ago regarding the dangers of hitchhiking, perhaps its time to remind people that hitching a ride, even on the information super highway, can be deadly hazardous.