FREE Search Engine Submission - Submit your site to dozens of top search engines for FREE. No strings attached! Blog Ping http://pingmyblog.com/

Sunday, December 12, 2010

How To Protect Yourself Against Sexual Assault



Sexual assault is any unwanted, nonconsensual, forced sexual contact or activity which purpose is to control and/or humiliate another person. It can include acts of touching, kissing exhibitionism, and intercourse — anal, vaginal or oral.

There are ways you can help prevent a sexual assault. According to the New York Police Detective Bureau, this includes being alert to your surroundings. Know the location, street name, surrounding buildings, in case it becomes necessary for you to call 911. Listen to your instincts. If you feel uncomfortable or in danger in any given situation, leave immediately.

Learn to be observant of people around you. What color eyes do they have? What are they wearing? Notice their teeth, tattoos, their size, hairstyle, or any other distinguishable features. All these will help you in the event it becomes necessary to contact the police.

Making Your Home Safe

Avoid sleeping with your windows open.

Have peep holes on your doors and use them. If you do not recognize who is at your door, do not open it, even with the chain on. Most chain locks can easily be kicked in.

Do not open the door to service people unless you are expecting them. Call their employer and verify their identity and the reason they need to enter your home.

If a stranger asks to use your phone, do not let the person enter. Offer to make the call for them.

Do not buzz someone into the building or hold the lobby door open unless you know the person.

Have the number to 911 programmed into your telephone.

Be mentally prepared of the possibility of being attacked and what possible actions you would take if confronted.

Install safety approved gates or bars on windows that can be reached from fire escapes on from the ground floor.

In your home or apartment, you will also want to make sure your entrance is well lit. Install security lights in areas where people can hide. Keep your doors locked and blinds pulled. Do not advertise your full name in the phone book on the mailbox. Your initials and last name are all that is needed. Invest in a paper shredder and shred any personal identifying envelopes or papers.

Wednesday, December 1, 2010

Study: 1 in 3 South African Men Admits to Committing Rape




A study commissioned by the Medical Research Foundation, a group funded by the South African government, has yielded some disturbing findings about violence against women. According to the study, one in three men in Johannesburg has committed rape at some point. Roughly 7 percent of the men sampled admitted to participating in a gang rape.

The study also found that more than 51 percent of the 511 women surveyed had been victims of violence from men. Also, 78 percent of men admitted to committing a violent act against a woman. One-fourth of the women in the survey said that they'd been raped, but only about 4 percent of these rapes are reported to police.

These findings are similar to a 2008 study that found that 28 percent of the men in Eastern Cape and KwaZulu-Natal provinces had committed rape against a woman or girl. One-third of the men said they did not feel guilty for what they'd done. Two-thirds of the men claimed to have committed rape out of a sense of entitlement, and others raped out of boredom or a desire to punish women who'd rejected them.

The study's author, Rachel Jewkes, said that apartheid may have played a role in creating a culture in which violence against women has been trivialized.

"Apartheid has contributed to culture of impunity surrounding rape in South Africa," said Jewkes, who added that men who experienced trauma or were abused were more likely to commit rape than other men.

Jewke's remarks about the impact of apartheid on violent behavior obviously makes me think about the United States of America. Americanized apartheid, in which a black underclass was created via oppressive forces, also fostered a culture in which women are consistently disrespected in media, treated as sex objects and forced to endure unreported acts of violence.

In fact, an older black man once laid it out to me in simple terms, explaining why his father had 20 children with more than 12 different women. He said, "When you would go out and get treated like sh*t all day, the only power that a man had was his d*ck." While the man's actions were not based on violence, this form of sexual decision making is likely linked to counterproductive responses to an oppressive environment. It is up to all of us to take the time to educate our sons and daughters about violence against women and sexual responsibility. South Africa is not the only place where people hurt one another.

One interesting case in which the life of a young black woman was disrespected was the trial against R&B singer R. Kelly. Despite the fact that quite a few people believed that Kelly was the man on tape having sex with a young girl, much of the black community continued to buy his albums without regard or concern for the young woman he may have raped. I was incredibly disappointed in many of my female friends, who seemed to feel that the little girl was asking for it, or that the quality of Kelly's voice mattered more than the fact that he might be hurting young girls. In fact, it actually sickened me.

We can all learn something from this study. As far as South Africa goes, I sincerely hope there are significant adjustments to the sexual culture of a nation where the government has denied the impact of HIV for a long time. There are nearly 6 million people in South Africa living with HIV or AIDS (more than any other country in the world), and more than 300,000 South Africans are believed to have died of AIDS-related illnesses in the last year alone. When the promotion of sexual ignorance is combined with unaddressed violence against women, you have a recipe for national disaster. The government had better deal with this issue soon.


Dr. Boyce Watkins is the founder of the Your Black World Coalition and a Scholarship in Action resident of the Institute for Black Public Policy.  

Tuesday, November 30, 2010

'Honeymoon Killer' Faces Murder Charges in US

'Honeymoon Killer' Returns to US for Prosecution

(Nov. 25) -- "Honeymoon Killer" Gabe Watson arrived home in the U.S. today to face two more murder charges in the drowning death of his wife, Tina, during a 2003 scuba-diving trip to Australia. 


Watson was released from an Australian prison earlier this month, where he served an 18-month sentence for manslaughter. Australian immigration agents escorted him on a flight today from Melbourne to Los Angeles, where they handed him off to the LAPD. 

The 33-year-old convict will now be sent to his home state of Alabama early next week to face two more murder charges for Tina's death, Attorney General Troy King told The Associated Press. 



Townsville Coroners Court / AP
Gabe Watson was convicted of manslaughter in the 
death of his wife, Tina.


Australian prosecutors initially charged Watson with murder, arguing that he deliberately killed his wife by turning off her air supply under the guise of giving her a "bear hug" underwater. But as part of a plea bargain, Watson agreed to plead guilty to the lesser charge of manslaughter. 

Haunting photos from their scuba-diving trip show another diver posing for an underwater pic while their instructor rushes to rescue Tina's lifeless body, which was sinking to the seafloor. The 26-year-old bride had been married only 11 days. 

"It's been devastating," Tina's mother, Cindy Thomas, told ABC News. "You never think your daughter will leave for her honeymoon and her husband will kill her."

Watson's plea deal angered his wife's family and authorities in their home state of Alabama, who believe he plotted to kill his wife even before they left the U.S. for their honeymoon in Australia. Prosecutors are expected to allege that Watson killed his wife in order to collect a life insurance payment. They also accuse him of kidnapping, for allegedly tricking his wife to go to Australia, where she was killed. 

King told the AP he believes Australian authorities were way too lenient with Watson, accusing them of having "extorted from the state and the victim's family" in order to "water down" justice. "Why did they decide to shield a man from punishment for what he did?" he asked. "I don't understand it."

Tina's father, Tommy Thomas, also reacted to news of Watson's arrival in the U.S. today. "What we want to see is justice done by our daughter. And obviously, an 18-month prison sentence, for murder, is not justice," told Alabama's Channel 13 TV.

Watson has since remarried. A former bubble-wrap salesman, he was dubbed the "Honeymoon Killer" by Australian media, which have followed his case closely. 

King said an Alabama grand jury indicted Watson on two counts last month, but the indictment was sealed until the suspect's return to the United States. The two charges are capital murder in the course of kidnapping, and capital murder for pecuniary gain, he said. 

U.S. officials have long sought Watson's extradition from Australia, but officials there were hesitant to turn him over to Americans because of their stance on the death penalty. Alabama allows the death penalty for murder cases, but Australian law prohibits the state from deporting anyone to a country where they could face execution. Australian officials have said that they agreed to deport Watson today after receiving assurances from their U.S. counterparts that he won't be executed -- even if he's convicted of first-degree murder. 

"The Australian government received assurances from the United States government that should Gabe Watson be returned to the U.S., the death penalty would not be sought, imposed or carried out in relation to this crime," Australia's immigration minister, Chris Bowen, told The Herald Sun newspaper.

Watson's Australian lawyer, Adrian Braithwaite, said his client could have applied for asylum in Australia but decided against it after reviewing documents that showed he won't face the death penalty in Alabama. 

"Based on advice that Mr. Watson had received from his U.S. attorneys, he has balanced up the risks going and ultimately has decided that he won't contest deportation," Braithwaite told Australia's ABC News. "He'll be returning to Alabama."

source: Lauren Frayer

Saturday, November 20, 2010

Why Women are Targeted for Crimes

Image 

Conventional stereotypes. Outdated and untrue concepts about women may still be predominant in the minds of many criminals. They continue to view women as the weaker sex, and therefore as people who may be easily overpowered and dominated. When given the choice between assaulting a man or a woman, most criminals admit that they would choose the female every time. But women are fully capable of fighting back.

Muggings And Robberies
Men are often subjected to being robbed or mugged, but women remain the most common victims of these crimes. Assailants tend to assume that women will be more passive and give up without a fight. When a predator is armed and yet non-threatening, the best thing to do is comply and be as cooperative as possible. However sometimes these incidents can take a turn for the worse ... and become violent.

Sex Crimes
Women are often targeted by predators for sexual assault, but not necessarily for the reason most people would imagine. Usually it is less about the physical act and more about attaining a level of control over another human being. Certain depraved individuals seek to hold power over others, and view rape as the ultimate form of domination.

Avoidance
The best possible resolution to crimes against women is to do anything possible to prevent them from happening. Criminals look for women who are alone, and in areas that are poorly lit. This gives them the chance to stay hidden and gain the element of surprise during an attack. To avoid this possibility, women should park in public places with good lighting, walk with others whenever possible and not linger in dark areas.

When walking alone, women should realize that they may be giving off an impression of being timid or afraid. This can be avoided by walking quickly and holding your head high in a self assured manner. Stay alert and be aware of everyone and everything in your general vicinity. A predator who is looking for easy prey will be less likely to attack someone who looks confident and capable of putting up a fight.

Whether driving or walking by themselves, women should be aware that they may be being watched or even followed. Pay close attention to the people and vehicles that are around you, and if you believe someone is trailing you, do not go home. Drive to a police station or walk towards a public location. Get to a spot that is safe and has other people around, which will cause the stalker to back off. Never lead someone to your residence - you don't want a predator to know where you live.

Fight Back!
Modern women do not fit the old stereotype that females are mousy and weak. When there is no way to avoid a criminal, the goal becomes basic survival. Fight back in any way you can. Use your purse, hands, feet and anything else as a weapon. You may wish to take a self defense class that will leave you better equipped to subdue an assailant, but the important thing is to strike hard, strike quickly and get away safely.

Another effective method of self defense involves carrying a non lethal weapon. Security devices like pepper spray, stun guns and Tasers will give you the upper hand, and allow you to subdue any assailant. Always be ready for anything when you are in public, and if your are assaulted, put up a strong fight that will make your attacker wish he hadn't targeted a women for a crime.

Friday, November 19, 2010

Top 10 Stolen Vehicles

Honda S2000 (2005 - 2007)


Every year thousands of automobiles are stolen. Statistics are gathered by watchdog groups who wish to inform the public about the vehicles that are most commonly taken in any given year. According to Autoblog.com, the ten most stolen vehicles of 2008 are:

# 10 - Honda S2000 (2005 - 2007)
# 9  - Dodge Durango (2005 - 2007 models)
# 8  - 8. Hummer H2 (2005 - 2007 models)
# 7  - Dodge Magnum (2005 - 2007 models)
# 6  - Hummer H2 SUT
# 5  - Ford F-350 SuperCrew (2005 - 2007 models)
# 4  - Dodge Charger (2006-07 models)
# 3  - Cadillac Escalade (2007 model)
# 2  - Ford F-250 SuperCrew (2005 - 2007 models)
# 1  - Cadillac Escalade ESV (2007 model)

Car Thieves
Any vehicle could be stolen, regardless of the age or condition it is in. Cars are taken to sell to others, be turned in for parts or for a quick joy ride or crime spree. According to many car thieves, the first thing they look for is easy access. That means a car that is not locked or has the windows rolled down is more likely to be stolen than one that is properly closed and locked up. Further protection such as an alarm or steering wheel lock will be even more of a deterrent to thieves. More advanced systems such as OnStar offer the ability to track the position of a vehicle no matter where it is. This is one of the most efficient and feared car security devices on the market. If a criminal knows they can be tracked down easily, they will not be too eager to take your vehicle.

Dodge Durango (2005 - 2007 models)

A second form of enticement for car thieves is when they can see valuable items on the seats or floor. This may be enough to encourage a criminal to choose a particular vehicle for a break in. They can smash a window and take what they want or just decide to steal the entire car. Professional car thieves can break into most any vehicle in a matter of seconds, so they might find it easier to just enter, drive off and sort through your possessions at their leisure.

8. Hummer H2 (2005 - 2007 models)

Summer Time
Criminals are often more active in the summer when people are spending their time relaxing on vacation. Tourists often rent nice vehicles to take a long journeys in, and thieves are always on the lookout for easy targets. A rental car is often not guarded as fastidiously as a privately owned vehicle would be. Remember that even if the automobile does not belong to you, it is still important to lock it up anytime you park.

Car Jackers
Criminals will not always wait until your vehicle is parked and unattended. Sometimes they will approach while you are stopped in a parking lot or at a red light and take the vehicle by force. The best way to prevent this is to be visibly alert at all times. Watch for pedestrians who get too close to your vehicle. Car jackers rely on the element of surprise, and may decide against victimizing you if you have seen them before they can attacl.

If you ever are accosted by a car jacker, the important thing to remember is that your security is far more important than the vehicle. Do everything you can to cooperate and get away safely. You should call the police immediately following the incident, but get out quickly, avoid making eye contact and make sure you are able to walk away unharmed.

Keep Your Vehicle Secure

All year long people take their cars on trips, but the most common season is summer. During these months, car thieves are always on the lookout for new vehicles in their city. While on vacation, people want to relax and take it easy, but they still must be aware of their surroundings and take precautions to keep themselves and their vehicles safe.

The most important rule of securing your vehicle is to always keep it locked. Many thieves have admitted that they look for cars that are unlocked, or have the windows rolled down. Criminals will be more likely to steal a vehicle they can get without trouble over a more expensive car that they would have to break into.

Another car safety tip to keep in mind is to never leave anything a criminal might want to in a visible area such as the back seat or floor. You don't want to draw attention to your vehicle and make it seem more appealing. A thief who notices valuables in an automobile may choose to steal it over other nearby cars, or at least break in to take what they want. Personal belongings should be placed in the trunk.

A car alarm is one of the best ways to protect your vehicle. Even a sticker that notifies people that the car has an active security system may be a deterrent to someone who is looking for a car they can steal quickly. That said, modern alarm systems have led to thieves developing high tech methods of disarming the vehicles they want, so you may choose to invest in a tracking device such as Lojack or OnStar. These systems allow police officers to track down and recover vehicles quickly.

When to Back Off

Car owners are protective of their vehicles. While it is wise to do everything possible to keep your automobile secure, if a situation ever comes down to your own safety versus allowing a criminal to get away with your car, your safety must always be the top priority.

Car jacking is a method predators use to steal a car while it is being operated by the owner. They wait until the vehicle is stopped and the driver will not be able to get away. Once a car jacker has targeted a particular automobile, they will take it by force, and will often carry a weapon that they are ready and willing to use. The best way to avoid a carjacking is to stay alert and watch for anyone who is approaching your while you are stopped. Keep your doors locked and windows up, as this alone may cause the criminal to choose another vehicle. If you are faced with deadly force, however, it is time to back off and let the thief have their way.

Top Ten Watch List

Every year thousands of cars, motorcycles and SUV's are stolen. Crime experts study the trends of car theft, and produce reports on the vehicles that are most often taken during any given year. The top ten list for 2007 included:
  1. 1995 Honda Civic
  2. 1991 Honda Accord
  3. 1989 Toyota Camry
  4. 1997 Ford F-150
  5. 1994 Chevrolet 1500
  6. 1994 Acura Integra
  7. 2004 Dodge Ram
  8. 1994 Nissan Sentra
  9. 1988 Toyota Pickup
  10. 2007 Toyota Corolla
The National Insurance Crime Bureau Auto Theft Study, a highly reputable group that specializes in crime studies, discovered these results. While every vehicle may be subject to being stolen, individuals who own one of the automobiles on this list should take extra care to protect their cars.
Whether you are traveling or at home, keeping your car safe is entirely up to you. Take precautions to protect your vehicle, but always keep in mind that no matter how valuable a car may be, your own safety is entirely priceless.

Sunday, October 24, 2010

Soldier's last words at Fort Hood were of family


FORT HOOD, Texas – On the floor and seriously wounded, Lt. Col. Juanita Warman was acutely aware that she could die following a gunman's rampage at Fort Hood.


"She said she'd been shot in the abdomen and was bleeding," Spc. Dayna Roscoe recalled Monday at a military court hearing. "She wanted someone to tell her family that she loved them and that she wasn't going to make it."

Warman, 55, a certified psychiatric nurse practitioner who'd spent 25 years in the Army or active reserves, died of her wounds. She was among 13 people who died Nov. 5 in the worst mass shooting at an American military base.

Testimony was expected to continue Tuesday at the Article 32 hearing, which will determine whether Maj. Nidal Hasan stands trial on 13 counts of premeditated murder and 32 counts of attempted premeditated murder.

Since the hearing began last week, 39 witnesses have testified. More soldiers and the two Fort Hood police officers credited with taking the gunman down are expected to testify.

Roscoe was at a medical processing center with dozens of other soldiers when gunfire erupted there. She survived wounds to her arm and leg after another soldier used belts as tourniquets.

None of the 10 soldiers who testified Monday was asked to identify Hasan, who sat in a wheelchair in the courtroom. He is paralyzed from the waist down from police gunfire that ended the onslaught.

But Roscoe described the gunman as wearing an Army combat uniform, bald and clean shaven. He carried a handgun as he rounded a corner and headed toward her, she said.

She said she covered her face, demonstrating by putting her hands around her ears and pulling her arms over the side of her head.

Asked by a prosecutor, Lt. Col. Steve Henricks, what would have happened if the bullet hadn't pierced her arm, "It would have struck me in the chest," she replied, adding that the gunman turned his attention elsewhere, then returned and shot her two more times.

Maj. Randy Royer, using a cane as he climbed the witness stand Monday, repeated events told by other witnesses, how a man identified by many as Hasan stood near the front door and shouted: "Allahu Akbar!" — "God is great!" in Arabic — before shooting at soldiers, all unarmed, in a crowded waiting area.

Many of the witnesses have testified that the gunman kept firing rapidly as he walked around the building, pausing only to reload.

Spc. Jonathan Sims, whose testimony via video link from Afghanistan was punctuated several times by the sounds jet aircraft, said on Nov. 5 he was trying to keep pressure on the neck wound of a buddy, Pfc. Mick Engenhl, when he was shot. He pulled a collapsed table over him and Engenhl, but soon felt pressure as if someone were standing on it.

Asked by Henricks if he thought he knew who stood on the table, Sims said: "I believe it to be the shooter.

"Who else would be dumb enough to stand up for that long period of time during shooting?"
At some point after the hearing, Col. James L. Pohl, the investigating officer in the case, will recommend whether Hasan should go to trial. That decision — and whether the Army will seek the death penalty — ultimately will be made by Fort Hood's commanding general.
Hasan remains jailed. There is no bail in the military justice system.

Saturday, October 23, 2010

U.S. convicts Singapore man in Tamil Tigers arms plot


WASHINGTON (Reuters) – A federal jury in Baltimore has convicted a Singapore national of conspiring to provide weapons to Tamil Tiger rebels operating in Sri Lanka, the U.S. Justice Department said on Monday.


Balraj Naidu, 48, was charged in a conspiracy to provide material support to the rebel group designated in 1997 by the U.S. Department of State as a foreign terrorist organization.

According to evidence presented at his trial, Naidu and four co-conspirators arranged to buy some 28 tons of U.S.-made weapons and ammunition from an undercover business in Maryland.

Tamil Tiger representatives made a $250,000 down-payment on the $900,000 weapons deal with the bogus company in the summer of 2006, the Justice Department said.

Naidu's partners were arrested in September 2006, after inspecting the weapons that had been delivered to Guam and making another payment of $450,000 to the undercover business, the Justice Department said. Naidu was arrested after a further investigation, it said.

U.S. officials said the group also had tried to buy weapons from China, Thailand, North Korea, the Philippines and Indonesia for the group formally known as Liberation Tigers of Tamil Eelam to be used against Sri Lankan government forces.

Naidu faces a maximum sentence of 15 years in prison.

The co-conspirators: Thirunavukarasu Varatharasa, 40, of Sri Lanka; Haji Subandi, 73, and retired Indonesian Marine Corps General Erick Wotulo, 62, both Indonesians; and Haniffa Bin Osman, 59, of Singapore, all pleaded guilty and were sentenced to 57 months, 37 months, 30 months and 37 months in prison, respectively.

The LTTE had advocated the violent overthrow of the Sri Lankan government and a separate state for Tamils since the movement's inception in 1976.

The U.S. designation as a foreign terrorist organization barred the rebel group from legally raising money or buying operational equipment in the United States.

Sri Lanka's military defeated the LTTE in May 2009 after an insurgency that lasted more than 30 years.

Friday, October 22, 2010

Obama's African Relatives Think His Father Was Murdered



(Oct. 18) -- Perhaps the president can add this one to his list of myths to bust in December when he appears on the Discovery Channel show "MythBusters": His father was not killed in a car accident in 1982, as was reported, but was murdered. 

So goes a family theory investigated by Peter Firstbrook in his history of President Barack Obama's African side of the family, "The Obamas," and dissected by Obama biographer David Remnick in a post today on the New Yorker's website. 

Barack Obama Sr. was "a thwarted politician and bureaucrat," outspoken in his criticism of the Kenyan government's acceptance of corruption among its ranks, according to Remnick. 

He was also a heavy drinker, nicknamed "Mr. Double-Double" after his usual Scotch orders. On the night of his death he was found inside his car, which had hit a tree. 

Firstbrook talked to Charles Oluoch, a cousin of the president, who related the family's suspicions. Obama Sr. had been in a number of accidents before and had survived them all. His body appeared to be fairly unharmed -- no broken bones and only a small amount of blood.

"Although it looked like an accident, our family suspected that there must have been foul play. I am not a medical doctor, but the way we saw Barack lying there, he didn't look like somebody who was involved in an accident," Oluoch said.

Sarah Obama, the president's step-grandmother, told the author a similar story. 

"We think there was foul play there, and that is how he died, and they covered it up [by saying] that he had an accident," she said. "But we just had to leave it like that because the government then was very ruthless."

Remnick talked to Caroline Elkins, a historian at Harvard, who said she doesn't buy it. Obama Sr. was a "serious, fall-down alcoholic" and his family is probably trying to restore his reputation now that they have one of their own in White House, she said.

But as Firstbrook points out 25 years later, we will probably never know the truth ...

Thursday, October 21, 2010

Five New Frightening Types of Cyber attacks



(Oct. 18) -- Worried about e-mails that appear to be from your bank but could well be part of a phishing scam? That may soon be the least of your problems. With concerns about cyberattacks on the rise, computer security experts are looking ahead to what they think might be the next wave of attacks. 

What they find is that everything from your car to your computer webcam is vulnerable to attack. Here are five new types of attacks:

1) Social Network Attacks: Malware that steals your e-mail contacts, passwords and other personal information is old news. But a new technical paper by a group of Israeli researchers says the cybersecurity community is ignoring a new, more insidious type of attack: one that preys on your entire social network, working to slowly pilfer information about your behavior and life.

Dubbed "stealing reality," these types of attacks, the researchers argue, are more insidious because the "victim of a 'behavioral pattern' theft cannot easily change her behavior and life patterns."

"Most likely those attacks are currently happening," lead author Yaniv Altshuler, a research scientist at Ben Gurion University, told AOL News.

Altshuler says the market for this sort of information already exists. "And If there is a buyer, there is a seller," he added.

2) Attacks on Cars: Today's automobiles often come equipped with the equivalent of advanced computer systems, which means that like your home computer, they could be vulnerable to attack. In a new paper, researchers at the University of Washington and the University of California, San Diego, say they have demonstrated "the ability to adversarially control a wide range of automotive functions and completely ignore driver input -- including disabling the brakes, selectively braking individual wheels on demand, stopping the engine, and so on."

Everything from your car's wireless tire-pressure sensors to its stolen-vehicle tracking and recovery system provides opportunities for hackers to gain control of your vehicle without you even knowing.

3) Medical Devices: Today, wireless pacemakers can send your doctor or hospital real-time data on your heart, showing just how far medical devices have come with the help of modern electronics. But with that new technology comes a new threat: the possibility of someone hacking into your medical device or injecting malicious code that disrupts the lifesaving device. Prosthetic limbs, wireless pacemakers and other implantable medical devices might all be at risk.

"This is very real -- the bad guys would buy the pieces and just work on them a little bit," Greg Hoglund, who heads HBGary, a computer security company, told an audience earlier this year at a Northern California Hospital Cyberterrorism Seminar. "It's amazing someone hasn't pulled this off yet."

4) Hacking Your Webcam: Watch out for the light on your computer that shows the webcam is on, even after you think you've turned it off. It could be a Trojan computer program operating the camera, taking pictures or even video, and sending it over the Internet without your knowledge. For those who leave their laptops on and open, that's the equivalent of having Big Brother in your bedroom or office without you knowing.

There are already cases of this happening, for example, in Germany. "A man has been arrested for spying on more than 150 girls in their bedrooms by hacking into their computers and using their webcams to watch them, provoking warnings that others will be doing the same thing," DPA, the German press agency, reported earlier this year.

5) Smart Phone Attacks: Most consumers worried about cyberattacks associate the threat with their home PCs or laptops. So they often think nothing of downloading applications to their smart phones, which often contain just as much personal information as their home computers.

"Nobody's making money at the moment with mobile security," said Mikko Hypponen, the chief research officer of Finland's F-Secure, according to the San Francisco Chronicle. "But all the players assume that sooner or later we will see a major outbreak or some other major event that will change the situation forever."

Filed under: Nation, Crime, Tech

Wednesday, October 20, 2010

If Your Identity Has Been Stolen Four Steps to Take Now


There are some funny television commercials today about the affects of identity theft, but for those who have been victims, there is nothing at all funny about the experience.

People have not only lost their credit ratings, money, and reputations due to identity theft, but have been refused loans, educational opportunities, job offers, and have even been arrested for crimes they did not commit.

According to the Federal Trade Commission, if you think your identity has been stolen, here are some steps that you need to take immediately:

Contact the fraud departments of any one of the three major credit bureaus to place a fraud alert on your credit file. The fraud alert requests creditors to contact you before opening any new accounts or making any changes to your existing accounts. As soon as the credit bureau confirms your fraud alert, the other two credit bureaus will be automatically notified to place fraud alerts, and all three credit reports will be sent to you free of charge.

Close the accounts that you know or believe have been tampered with or opened fraudulently. Use the ID Theft Affidavit when disputing new unauthorized accounts.

File a police report. Get a copy of the report to submit to your creditors and others that may require proof of the crime.

File your complaint with the FTC. The FTC maintains a database of identity theft cases used by law enforcement agencies for investigations. Filing a complaint also helps us learn more about identity theft and the problems victims are having so that we can better assist you.

Tuesday, October 19, 2010

Preventing Child Abuse


As an individual and as a member of your community, you have the power to prevent child abuse and neglect. Here are some ways to contribute your ounce—or more—of effort to prevention.

Understand the problem. Child abuse and neglect affect children of all ages, races, and incomes. According to the National Child Abuse and Neglect Data System, in 2001, an estimated 903,000 children nationwide were victims of maltreatment. Most experts believe that actual incidents of abuse and neglect are more numerous than statistics indicate.

Understand the terms. Child abuse and neglect take more than one form. Federal and State laws address four main types of child maltreatment: physical abuse, physical or emotional neglect, sexual abuse, and emotional abuse. Often more than one type of abuse or neglect occurs within families. Some types of maltreatment, such as emotional abuse, are much harder to substantiate than others, such as physical abuse.

Understand the causes. Most parents don't hurt or neglect their children intentionally. Many were themselves abused or neglected. Very young or inexperienced parents might not know how to take care of their babies or what they can reasonably expect from children at different stages of development. Circumstances that place families under extraordinary stress - for instance, poverty, divorce, sickness, disability - sometimes take their toll in child maltreatment. Parents who abuse alcohol or other drugs are more likely to abuse or neglect their children.

Support programs that support families. Parent education, community centers, respite care services, and substance abuse treatment programs help to protect children by addressing circumstances that place families at risk for child abuse and neglect. Donate your time or money, if you can.

Report suspected abuse and neglect. Some States require everyone to report suspected abuse or neglect; others specify members of certain professions, such as educators and doctors. But whether or not you are mandated by law to report child abuse and neglect, doing so may save a child - and a family. If you suspect a child is being abused or neglected, call the police or your local child welfare agency.

Spread the word. Help educate others in your community about child abuse and neglect. See the list below for sources of free materials. Ask if you can leave a stack of brochures at your local public library, recreation or community center, government center, or other public place. You also might make material available at your church, synagogue, mosque, temple, or other faith institutions. Even grocery stores usually have places to distribute community materials.

Strengthen the fabric of your community. Know your neighbors' names and the names of their children, and make sure they know yours. Give stressed parents a break by offering to watch their children. Volunteer. If you like interacting with children, great, but you do not have to volunteer directly with kids to contribute to prevention. All activities that strengthen communities, such as service to civic clubs and participation on boards and committees, ultimately contribute to the well-being of children.

source: about.com

Monday, October 18, 2010

The Four Types of Domestic Abuse ,Abuse Can Take Many Forms



Domestic abuse is a growing problem that affects millions of people in all kinds of relationships including traditional marriages, same-sex partnerships or even relationships where there is no sexual intimacy involved.

Physical violence, of course, is the most blatant form of domestic abuse, sometimes called intimate partner violence. But physical abuse is not the only form of domestic abuse.

Four Main Types of Abuse

According to the Centers for Disease Control and Prevention, intimate partner violence means physical, sexual or psychological harm inflicted by a current or former spouse or partner.

According to the CDC, these are the four main types of intimate partner violence:

Physical Violence - This mean intentionally using physical force to harm, injury, disable or kill. It can involve using a weapon or restrains or merely using body, size or strength to harm another person. Physical violence can include:

Burning
Biting
Choking
Grabbing
Punching
Pushing
Throwing
Scratching
Shoving
Shaking
Slapping

Sexual Violence - Sexual abuse not only includes forcing someone to have sex, but it can also include having sex with someone who is unable to refuse due to disability, illness, intimidation or the influence of alcohol or other drugs.

There are three main categories of sexual abuse:

Using physical force to compel someone to have sex against their will, whether the act is completed or not.

Attempting or having sex with someone who is unable to understand the nature of the act or unable to decline participation or is unable to communicate their unwillingness.
Abusive sexual contact of any kind.

Threats of Violence - The use of words, gestures, motions, looks or weapons to communicate a threat to harm, injure, disable, rape or kill them. The act does not have to be carried out for it to be abusive behavior.

Psychological and Emotional Abuse - Using acts, threats of acts or coercive tactics to cause someone emotional trauma. If there has been previous physical or sexual abuse in the relationship, any further threat of abuse is considered psychological or emotion violence.

Psychological abuse can include:

Humiliation
Controlling what the victim can and cannot do.
Withholding information.
Diminishing or embarrassing the victim.
Isolating the victim from friends and family.
Denying the victim access to money or other resources.

Get Help Immediately

Research shows that domestic violence usually gets progressively worse. Rarely does it stop because the abuser promises that it will never happen again. If you are in an abusive relationship, there are many resources available to help you. Please seek help today.

source: about.com

Sponsor Links

CHILDREN SAFETY BOOKS?
Your Personal Safety Or The Safety Of Your Family Members!
Teach You And Your Family How To Stay Safe!
www.carringtonbooks.com

HOW TO REDUCE FEAR, ESCAPE ANXIETY AND END PANIC?
How Could It Be So Easy,You've Just Been Released From Your Own Private Prison Of Fear!
www.reduce-fear.com

SUICIDE WARNING SIGN?
Learn The Suicide Warning Signs That Your Child, Friend or Partner Is Showing and Help Save Their Lives, Before It's TOO LATE!
Think Carefully About It, Their Life Could Very Well Depend On You!
suicidewarningsigns.net