Cyber AngelsTop Rated CyberAngels are comprised mainly of law enforcement officers, information technology specialists, educators, parents, librarians, technical writers, and legal professionals volunteers, all whom happily give up free time to ensure that your Internet experiences are safe. CyberAngels teams are specially trained to help victims trace and identify the perpetrators of online crime so that they may be prosecuted.
Besides monitoring the Internet and assisting victims of Internet-related crimes, CyberAngels provides free online classes and articles (such as, basic tips about online privacy, filtering software, Internet terms, browser, email, online purchases, file sharing, cyberstalking, identity theft, hacking, and etc.) Preview Website -
2-Jul-2002 - Hits: 302 - Rate This | Details
Cyberstalking: Dangers on the Information Superhighway This article provides facts about cyberstalking and expert guidance for victims of cyberstalking.Although there is no universally accepted definition of cyberstalking, the term is generally used to refer to the use of the Internet, e-mail, or other telecommunication technologies to harass or stalk another person. It is not the mere annoyance of unsolicited e-mail. It is methodical, deliberate, and persistent. The communications, whether from someone known or unknown, do not stop even after the recipient has asked the sender to cease all contacts, and are often filled with inappropriate, and sometimes disturbing, content. Essentially, cyberstalking is an extension of the physical form of stalking. Preview Website -
5-Oct-2006 - Hits: 169 - Rate This | Details
Identity TheftTop Rated What is identity theft? Identity theft occurs when an individual's personal identifying information for example, name, address, and social security number is taken and used to steal money or services. Personal information can also be used to create a false identity that will make it harder for law enforcement to find the perpetrator. Stalkers sometimes use victims stolen identities to harass their victims by, for example, subscribing to unwanted publications and services, taking out personal ads in their names, or using Internet chat rooms, message boards, and e-mail to impersonate them. Preview Website -
5-Oct-2006 - Hits: 94 - Rate This | Details
National Center for Missing & Exploited Children (USA) The National Center for Missing & Exploited Children's (NCMEC) mission is to help prevent child abduction and sexual exploitation; help find missing children; and assist victims of child abduction and sexual exploitation, their families, and the professionals who serve them.
Report child exploitation through the CyberTipline. The types of child sexual exploitation that may be reported:
Possession, manufacture, and distribution of child pornography (visual depiction of a child younger than 18 years old engaged in sexually explicit conduct),
Online enticement of children for sexual acts (use of the Internet to entice, invite, or persuade a child to meet for sexual acts, or to help arrange such a meeting, is a serious offense),
Prostitution of children (performing, offering, or agreeing to perform a sexual act for any money, property, token, object, article, or anything of value),
Sex tourism involving children (traveling abroad to engage in sexual activity with any child under the age of 18),
Child sexual molestation (child sexual exploitation--not in the family-- also known as extra-familial child sexual abuse, includes all sexual exploitations of a child by someone other than a family member),
Unsolicited obscene material sent to a child (attached as an image or hyperlink sent to a child under the age of 16 in an unsolicited E-mail or "spam"),
Misleading domain name (with the intent to deceive a minor into viewing material that is harmful to minors).
Protect Kids Protecting Kids in cyberspace. Topics include: Internet dangers, pornography definitions, how children access pornography on the Internet, how pornography harms children, sexual predators online, IM/Chatroom safety tips, the centerfold syndrome, sexual addictions, child sexual abuse, exploitation, and more. Preview Website -
4-Oct-2006 - Hits: 181 - Rate This | Details
Reading Email Headers This article provides a comprehensive introduction to the behavior of email headers to help determine the real source of the email that plagues victims of unsolicited email ("spam"). Preview Website -
4-Oct-2006 - Hits: 42 - Rate This | Details
Working to Halt Online Abuse Working to Halt Online Abuse (WHOA) provides information on cyberstalking. Need Help? WHOA teaches you how to respond to online harassment.
WHOA is a volunteer organization founded in 1997 to fight online harassment through education of the general public, education of law enforcement personnel, and empowerment of victims. We've also formulated voluntary policies which we encourage online communities to adopt in order to create safe and welcoming environments for all internet users. Preview Website -
4-Oct-2006 - Hits: 56 - Rate This | Details