Stalkers in Yasni Exposé of Nicole Androun

Visitors
(2015 since 26.07.2010)

Person-Info

134

Nicole Androun, chicago

Nickname: nicky, Country: United States of America, Language: English
Nicole Androun @ chicago

1 Image of Nicole

Loading...
1 - 1 from 1
Nicole Androun @ chicago
Oct 10  +

9 results for Nicole Androun

REMEMBER: PROTECT YOURSELF!

The Internet is a wonderful place to work, play and study. But don't let that fact make you blind to its down side. The Net is no more and no less than a mirror of the real world, and that means it also contains electronic versions of real life problems. Stalking and harassments are problems that many people especially women, are familiar with in real life. These problems can also occur on the Internet, in what has become know as "cyberstalking" or "on-line harassment". If you thought that owning a computer and having an Internet account would make a person considerate and respectful; then think again. There are just as many predators in cyberspace as anywhere else. It is only their methods that have changed. Some predators might harass you by trailing around after you in live channels like lovesick puppies; unable to take NO for an answer and pestering you with email messages. In other cases this harassment may become a systematic campaign against you; where your harasser bombards you with threatening messages of hate and obscenities. Although distressful enough, the situation can even escalate to the point where your harasser traces your home address and telephone number; causing you to face not just emotional distress but also physical danger. It should come as no surprise to you that the "bad guys" are making use of this wonderful technology to harass people and prey on the innocent. Why wouldn't they? Not all bad guys are street punks with no education. Some are university graduates with computers. There have been many examples of cyberstalking crossing over to "IRL" stalking (In Real Life stalking). Sadly, those users who have been victims of cyberstalking, tell a similar story: That no one took the harassment seriously until it became "IRL". Cyberstalking can be a devastating experience for a person online. As they discover that the difference between the "Brave New World" of the Internet and the Real World is that in the real world people listen when you tell them you are being stalked and harassed. In cyberspace people say things like "well just turn off your computer". Such incomprehension is common. "You can't be hurt on the Internet - it's just words" is commonly heard and "If you can't handle it, then you shouldn't be online" is another commonly hear comment. The online stalking is just as frightening and distressing as off-line stalking, and just as illegal. girls and guys may be stalked on-line, but statistics show that the majority of victims are female. Girls/Women are the minority of the Internet population which means that their attention is generally a fierce competition between male users. This part of the Internet, resembles crude online single bars, with little in the way of politeness. Unfortunately the immediate and relative anonymity of live chat communications facilities enable users to be rude and insensitive. Cyberstalking and online harassment are also much easier to practice than real life stalking. In cyberspace, a stalker can harass their victim without ever have to leave the comfort of their own home, or have any witnesses to the incidents. Online users are vulnerable to being targeted as cyberstalking victims in three areas. 1) Live Chat or IRC (Internet Relay Chat): in which a user talks live with other users. This is the most common place for cyberstalking. 2) Message boards and Newsgroups: a user interacts with others by posting messages, conversing back and forth. 3) Email box: a user has the ability to write anything and even attach files to the email. Example: a user enables your email, via live chat or newsgroup postings, then emails you with obscenities, and attaches porno pictures. A common area regarding cyberstalking is at the "edu" sites, which are educational institutes, such as colleges and universities. One user might know another user personally and interacts on the Internet anonymously, so starting the cyberstalk. One student can enter the Internet as easily as another student, therefore not letting his true identity be known. And since user names can be unknown alias, who would ever know the identity or be able to prove the identity. In such cases, the stalker usually has the ability to trace the victim's phone number and sometimes the address of his victim. Other forms of online harassment: 1) Unsolicited email 2) Live Chat 3) Hostile Usenet Postings about you 4) Spreading vicious rumors about you 5) Leaving abusive messages on site guestbooks 6) Impersonation of you online 7) Electronic sabotage, (sending viruses, etc) 8) Threatening phone calls 9) Threatening mail 10)Vandalism of property 11) Physical attack. There are many precautions that you can take NOW to protect yourself in advance from the unwelcome attention of a cyberstalker. Remember: The goal of a cyberstalker is CONTROL. Your task is to reverse this situation. Keep control of who you communicate with on the Internet. To do this, you may like to consider the advice below. Remember, the time to deal with cyberstalking is before you become a target. CYBERSTALKING PREVENTION TIPS If you are being harassed online by a cyberstalker, the chances are that you are not the first person they have stalked. Cyberstalkers, like other predators, are opportunists. They know what they are looking for and how to get it. "Stalking" is a "power" crime, the stalkers has the power to make you suffer and enjoys that power. Stalkers' self-esteem rises when they attack your self- esteem. The more pain and suffering they can cause, the better they feel about themselves. The best protection against becoming a target of stalking is not to reveal anything personal that you might have in common. Often, stalkers are mentally unstable, paranoid, delusional, and extremely jealous, and have extremely low self-esteem. Stalkers may display selfishness, malice, sadism, be very cunning and arrogant. Most are anti-social, and to put it in layman's terms, be a "control freak", enjoying manipulating other people. They crave power over others, and enjoy the type power that hurts other people. harassment is common enough in live chat on the Internet. The three most common ways it can start are: 1) sexual harassment; 2) a flame war (argument that gets out of hand); 3)users that show their technological power by attacking innocent users, channels or even networks. Those who regularly start flame wars online are rude an obnoxious people, often having poor social and communication skills. Their idea of fun is throwing obscene abuse at another just to upset them. These kind of harassers are often loners who don''t have a companion and their attempts to attract your attention is often clumsy and crude. Care should always be taken when turning them away, as they are highly sensitive to rejection and humiliation, and could cause a vendetta to start against you. Understand that although clumsy and crude in most cases, the stalker is not stupid, they are very organized and usually experienced in their war against you. Stalking is a form of obsession. The difference between a normal cyber harasser and a cyberstalker, is this: harasser moves on to others and forgets you and a stalkers will come back to stalk you another day. The Internet enables the stalker, his powers, in most cases, merely a knowledge of the technology is all required to have the ability to stalk another user. Most stalkers, having been rejected desire to instill fear in users, therefore, upsetting the normal enjoyment of the Internet. Note that educated, smooth talking, responsible people also can be stalkers, appearing to be a perfect gentleman or lady with perfect manners. The major "clue" to cyberstalking, is when the stalker pushes for information regarding you personal life, private life, or life away from the net. Rule of thumb, as it may be referred to is: "NEVER GIVE ANY PERSONAL INFORMATION ACROSS THE INTERNET!" Online meetings should stay online, the individuals are, in fact, strangers. Online, the physical warning signs usually in the "body language" are missing. Also the clues of personality within the voice and eyes are missing. All there is to determine a personality is the skill in which they type there messages. There is no code of honor in protecting privacy on the Internet. Each user should therefore take steps to protect their privacy online. 1) never specify gender 2) use neutral-gender names 3) change your password often 4) edit your online profiles often 5) review your email headers and signatures often 6) use secure chat programs that do not permit tracking of your isp# 7) use a good chat network 8) use standard names, passive names to as to not draw attention to you 9) use anonymous remailer. 10)use an anonymous browser 11)use encryption to authenticate email 12) discuss privacy with your server. And last: learn your technology. REMEMBER: PROTECT YOURSELF!
Nicole Androun @ chicago
45x
yasni 2010-10-14  +  

Online Stalking

Many people are under the illusion that online stalking is somehow different from offline stalking. Some of those that believe this are the stalkers themselves. And so they assume that the police will not act. I for one know that the police can act on these laws, and do. Online stalkers are put in jail, just like stalkers that don't use computers. There is absolutely no difference. The police can get records for online stalkers directly from the service providers, so those hiding by using fake names can be easily identified. Even the telephone number that they use to dial in to the server can be traced. And there are a lot of other ways law enforcement can trace the stalker. These officers are networked with computer crimes officers all over the country so no matter where the stalker lives, they can be arrested for stalking you, no matter where you live. They can even put a trace on the stalkers email, and trace everything this stalkers sends no matter what ISP's the stalker is using. WHO DO YOU CONTACT ABOUT AN ONLINE STALKER? For most crimes, you would normally contact your local police, the sheriff's office or the state police, and you can do that with online stalkers. However, many of those offices are simply not equipped with trained personnel who can work effectively to have an online stalker that may reside in another state arrested. However, under a new federal mandate all states are now required to have a new Computer Crimes Division, that is headed by the state's Attorney General. These people deal specifically with crimes by stalkers and pedophiles and can make arrests no matter what state the stalker is in. :-)
Nicole Androun @ chicago
45x
yasni 2010-10-05  +  

ONLINE STALKERS CAN BE PUT IN JAIL

I have been researching heavily, and have found that indeed, the law does not differentiate between offline stalking and online stalking. If someone uses a computer to stalk you it is no different from if they were doing it by phone or in person. THEY CAN BE PUT IN PRISON! Do not threaten to have the stalker arrested. Don't even let them know the police have been contacted. They might slow down for a while, but they will return, and the next time they will be more careful making it harder for the police to catch them. You should notify the police the very first time someone threatens to stalk you. You should follow up with the police each time they harass you. Once the police catch the stalker you should PRESS CHARGES (Never let the stalker talk you out of pressing charges - don't believe their false promises to stop). In court, you should go in front of the judge and ask for the maximum punishment available by law.
Nicole Androun @ chicago
41x
yasni 2010-10-05  +  

Tips for Stalking Victims

These tips will help you guard your personal information and lessen the chance that it will get into the hands of a stalker or harasser. However, some of these tips are extreme and should only be used if you are indeed being stalked. Harassment can take many forms, so this information may not be appropriate in every situation and may not resolve serious stalking problems. 1. Use a private post office box. Residential addresses of post office box holders are generally confidential. However, the U.S. Postal Service will release a residential address to any government agency, or to persons serving court papers. The Post Office only requires verification from an attorney that a case is pending. This information is easily counterfeited. Private companies are generally stricter and will require that the person making the request have an original copy of a subpoena. Be sure to get a private mailbox that is at least two ZIP codes away from your residence. Use your private post office box address for all of your correspondence. Print it on your checks instead of your residential address. Instead of recording the address as "Box 123," use "Apartment 123." If you must use a traditional home mailbox, make sure it has a lock. 2. Do not file a change of address with the U.S. Postal Service. Send personal letters to friends, relatives and businesses giving them the new private mailbox address. Give true residential address only to the most trusted friends. Ask that they do not store this address in rolodexes or address books that could be stolen. 3. Sign up for your state's address confidentiality program. As of October 2007, 28 states had an address confidentiality program, though many of the other states and territories had some mechanism in place to protect victim confidentiality. Address confidentiality programs offer a no-cost mail-forwarding program that enables victims of domestic violence and stalking to protect their residential address. A few states limit the program to just the driver’s license or voter records. For a list, visit the Stalking Resource Center's Address Confidentiality Programs Chart. 4. Obtain an unpublished and unlisted phone number. The phone company lists names and numbers in directory assistance (411) and publishes them in the phone book. Make sure you delete your information from both places. Do not print your phone number on your checks. Provide a work number or use an alternate number such as a voice mail number when asked – that is, a message-only number that is used solely for receiving recorded messages from callers. Consider replacing you landline with a cell phone if you haven't already done so. (see below) Always use caution when sharing your number. 5. If your state has Caller ID, order Complete Blocking (called "Per Line" Blocking in some states). This can help prevent your phone number from being disclosed when you make calls from your home. Be aware that blocking is not 100% effective. Programming “glitches” can sometimes inadvertently reveal blocked numbers. At least one company now offers a service that can “unblock” blocked numbers. It does this by forwarding your call to a toll-free number, which can then capture your phone number. For the best protection, use a pre-paid calling card from a pay phone (but this may reveal the general location of the pay phone). As payphones are become less prevalent, you may also try a pre-paid cell-phone (see below). Consider using a Caller ID Spoofing service to mask your number. Also see PRC Fact Sheet 19: Caller ID and My Privacy. 6. Buy a pre-paid cellular phone with cash. You typically do not need to provide a billing address or sign a contract for these kinds of phones. Be sure to get a phone number with a different area code from your current location. The most secure phones are those that do not connect to the Internet. When activating your phone, provide little or no personal information. Immediately disable any location tracking services (talk to your carrier or refer to the manual to learn how to do this). Try to keep a charged cell phone readily accessible to call for help in the event of an attack. Some websites advertise a service to pinpoint the physical location of any cell phones (including those with location tracking disabled) using triangulation of signals to cell towers. Regardless of what these websites promise, it is extremely unlikely that anyone other than law enforcement agents and telecommunications companies have the ability to track the location of cell phones in the U.S. unless the phones have location tracking enabled or special software installed. Most of the time, a stalker would need physical access to your phone to install software in order to use location tracking devices. At a minimum, a stalker (or even the police) would need to know a victim's phone number in order to track his or her location through the phone. You can protect your phone number by using a Caller ID Spoofing service when you make phone calls. This will allow you to choose whatever number you want to appear on the recipient's Caller ID. Remember that when the phone is powered off completely, not even the police or a telecommunications carrier can track its location. If your stalker somehow learns your phone number, change your number by contacting your carrier. For maximum security, replace the phone entirely (especially recommended if your stalker gets physical access to your phone). Some domestic violence shelters offer free cell phones to battered women. 7. Guard the cell phones of your children. If your child has a cell phone, remember that it too can be an avenue for tracking you. A stalker who intercepts your child's phone, such as a former partner who has partial custody of a child, can load tracking or recording software onto a cell phone. Be just as cautious with a child's phone as you are with your own. 8. Avoid calling toll-free 800, 866, 888, 877 and 900 number services. Your phone number could be "captured" by a service called Automatic Number Identification. It will also appear on the called party's bill at the end of the month. If you do call toll-free 800 numbers, use a pay phone or a prepaid cellular phone (see above) that can be quickly disposed of, should the number become compromised. 9. Have your name removed from any "reverse directories." The entries in these directories are in numerical order by phone number or by address. These services allow anyone who has just one piece of information, such as a phone number, to find where you live. Reverse directories are published by phone companies and direct marketers. Contact the major directories and request that you be removed from their listings: * Haines Criss+Cross Directory, Attn: Director of Data Processing, 8050 Freedom Ave. N.W. , North Canton, OH 44720. By phone: Call (800) 843-8452 and ask for extension 312. * Equifax Direct Marketing Solutions (formerly Polk): By mail: Equifax Direct Marketing Solutions, Attn: List Suppression File, PO Box 740256 Atlanta GA 30374 Include your name, address, ZIP code, phone number and a description of what information you would like suppressed. By phone: (888) 567-8688. Review our list of Online Information Brokers to find out what companies may be publishing your information online. Some of these, such as Switchboard.com, are online reverse directories. Opt-out when possible if you believe they have accurate contact information for you. 10. Let people know that information about you should be held in confidence. Tell your employer, co-workers, friends, family and neighbors of your situation. Alert them to be suspicious of people inquiring about your whereabouts or schedule. If you have a photograph or description of the stalker and vehicle, show a photo or describe the person to your neighbors, co-workers, friends, family and neighbors. 11. Do not use your home address when you subscribe to magazines. In general, don't use your residential address for anything that is mailed or shipped to you. 10a. Do not accept packages at work or home unless they were personally ordered by you. 12. Avoid using your middle initial. Middle initials are often used to differentiate people with common names. For example, someone searching public records or credit report files might find several people with the name Jane Doe. If you have a common name and want to blend in with the crowd, do not add a middle initial. In fact, consider using your first initial and last name only in as many situations as you can. 13. When conducting business with a government agency, only fill in the required pieces of information. Certain government agency records are public. Anyone can access the information you disclose to the agency within that record. Public records such as those held by a county assessor, county recorder, registrar of voters, or state motor vehicles department (DMV) are especially valuable to a stalker, as are business licenses. Ask the agency if it allows address information to be confidential in certain situations. If possible, use a commercial post office box and do not provide your middle initial, phone number or your Social Security number. If you own property or a car, you may want to consider alternative forms of ownership, such as a trust. This would shield your personal address from the public record. (For more information on government records and privacy, see PRC Fact Sheet 11: From Cradle to Grave - Government Records and Your Privacy) 14. Put your post office box on your driver's license. Don't show your license to just anyone. Your license has a lot of valuable information to a stalker, including your date of birth. 15. Don't put your name on the list of tenants on the front of your apartment building. Use a variation of your name that only your friends and family would recognize. 16. Be very protective of your Social Security number. It is the key to much of your personal information. Don't pre-print the SSN on anything such as your checks. Only give it out if required to do so, and ask why the requester needs it. The Social Security Administration may be willing to change your SSN. Contact the SSA for details. (See PRC Fact Sheet 10: My Social Security Number - How Secure Is It?) 17. Alert the three credit bureaus--Experian, Equifax and Trans Union. Put a fraud alert on your credit reports to avoid fraudulent access. Better yet, freeze your credit reports. (See PRC Fact Sheet 17a: Identity Theft - What to Do if It Happens to You for information on establishing fraud alerts and security freezes. See Consumers Union's Guide to Security Freeze Protection) 18. If you are having a problem with harassing phone calls, put a beep tone on your line so callers think you are taping your calls. Use an answering machine or voicemail service to screen your calls, and put a "bluff message" on your machine to warn callers of possible taping or monitoring. Be aware of the legal restrictions on taping of conversations. Use an answering machine even if you already have Caller ID. It is possible for a tech-savvy stalker to circumvent Caller ID by having a trusted number appear when he or she calls. This practice is known as Caller ID Spoofing. Consider screening your calls by allowing all incoming calls to go to the answering machine before you pick up. If you have harassing or threatening messages left on your answering machine or voicemail, tape record them in case you need them as evidence for a restraining order or in filing a police report. (See PRC Fact Sheet 3: How to Put an End to Unwanted or Harassing Phone Calls. See also PRC Fact Sheet 9: Wiretapping and Eavesdropping on Telephone Calls. The Reporters Committee for Freedom of the Press offers a 50-state guide to laws regarding taping phone calls.) 19. If you are a victim of cyberstalking, act promptly and firmly to defuse the situation. Take potential threats seriously. Very clearly tell that person to stop, saying something like, “Do not contact me in any way in the future.” Sometimes it is helpful to copy your “stop” message to the abuse department of the harasser’s Internet service provider. (If you have trouble determining that ISP, contact www.Cyberangels.org or www.Haltabuse.org.) Do not respond to any further messages from the harasser or have anyone else contact the harasser on your behalf. Change your email address if necessary. Do not enter any personal information into online directories. See Cyberstalking Resources at the end of this guide and the PRC's Fact Sheet 18: Privacy and the Internet. For a list of state cyberstalking laws, see National Conference of State Legislatures. 20. Keep a log of every stalking incident. Building such a paper trail can make a successful prosecution more likely. Examples of evidence that may help build a case include: Caller ID records, logs of phone calls, copies of threatening letters and email messages, items sent to you in the mail, pictures of injuries, or even photos of the stalker outside your home. Plus, maintain a list of names, dates and times of your contacts with law enforcement. 21. Consider getting professional counseling and/or seeking help from a victims support group. They can help you deal with fear, anxiety and depression associated with being stalked. 22. Make a police report. Consider getting a restraining order if you have been physically threatened or feel that you are in danger. Study your state’s stalking law to gain a clear understanding of what conduct constitutes an offense under the statute. You should contact an attorney or legal aid office if a restraining order becomes necessary. When filed with the court, a restraining order legally compels the harasser to stay away from you, or he/she can be arrested. Be aware that papers filed for a restraining order or police report may become public record. Put minimal amounts of information on such documents and provide only a post office box address. Note: Some security experts warn that restraining orders sometimes lead to violence. Before obtaining a restraining order, consider your options carefully. 23. Be cautious about applying for a domain name. If you use your name as a Web site domain name (for example, www.janedoe.com), it will be relatively simple for potential stalkers to locate your physical address because that information is available in the domain-name databases. Check your current listing by visiting www.domainwhitepages.com. When registering a domain, look into private web registration services. 24. Develop a safety plan. Remember, even restraining orders do not always prevent stalking from escalating into violence. Make sure friends, neighbors, and co-workers know about your situation. Show them photos of the stalker. Keep handy the phone numbers of assisting agencies. Set up easy access to a reserve of money, credit cards, medication, important papers, keys, and other valuables in case you need to leave quickly. Have a safe place in mind that you can go in an emergency. Try not to travel alone. Always vary your routes. Carry a cell phone with you. 25. Password-protect all accounts, even your utilities. A stalker may try to transfer funds out of your bank account, cancel your credit cards or even cancel phone, electric or water service. Protect yourself by having hard-to-crack passwords on all of your accounts. See PRC Alert: 10 Tips for Creating a Hacker-Resistant Password. 26. Be aware of your cellular phone's geolocation technology. Geolocation technology built into your cell phone may enable a stalker to ascertain your location. You are at greater risk if the stalker has had access to your phone or your cellular account, and thereby may have had the ability to turn on geolocation tracking. If you suspect that your phone’s geolocation tracking has been activated, call your carrier to find out. Request that it be turned off. In fact, many domestic violence shelters will remove the battery from a victim's cell phone and/or turn it off to insure that the phone's geolocation feature cannot be used to locate the victim. 27. And these final tips from someone who was stalked for over three years: For your own protection, carry pepper spray. Get a mobile phone. Carry a digital or video camera. Never verify anything like your home address over the phone.
Nicole Androun @ chicago
36x
yasni 2010-10-05  +  

Rate now

(30)
 30 Ratings 
5 Stars (23)
4 Stars (6)
3 Stars (1)
2 Stars (0)
1 Star (0)

Your connection to Nicole Androun

Me
Me
Nicole Androun @ chicago
Nicole

You don't have an Exposé on Yasni yet.

Important people: Today - Overview / Names: Today - Overview
+1