SORT BY Relevancy
Welcome to VOP-FreedomMedia's CyberStalking Special with your host, Hank McGrath, LIVE from our studio's in Johnstown, NY.
Featuring Harold Bryant - Media Security Specialist, special guest and stalking victim, Fi Fi Galore, Chrissy D, coverage on the issue of cyberstalking and the laws which protect victims,commentary on Facebook and Smartphone addictions, "Gang Stalking" by government agencies and law enforcement, audio from Mike German - Retired FBI agent on the eGuardian Programand MORE! All with news and cool entertainment.
LISTEN WHILE YOU SURF!
Does the title of this week's episode creep you out? Good, because more and more intimate personal information is available online about each and every one of us than is "healthy." Worse still is that's it's all too easy to become a victim of cyberstalking. That's because most of us disseminate far too much personal information on social nets, in chatrooms,and via photo and video sharing services. It's also far too easy to get the vast majority of us to volunteer even more intimate details regarding our religious and political affiliations, income, sexual orientation, and health-related issues. Worst of all, there are companies and cybercriminals that profit from this glut of easily obtained information. The result? We're all putting our personal and financial futures at risk. During this episode we'll show you how easy it is to glean reams of information about nearly anyone -- and importantly -- what you need to do to keep yourself from getting caught with your pants down. And if that doesn't creep you out, I don't know what will.
Don't fall for their charm. Predators can be very nice, friendly people, especially to children. If someone is continually trying to get you alone, or to isolate you from your friends or family, there is something wrong there. These people often make light or make "games" of inappropriate touching:
Touching a young girl around the breast area or any child around the crotch. They might then laugh or giggle, saying, "Oops! Did I get you?" If it's innocent, that would be the end of it. If it's more sinister, then it would happen again, probably very quickly, and could be something like: "Oops - did it again! Did I get you there?" accompanied by a touch in a sensitive place. He or she may even brazenly ask if you "liked that." Your Red Alert should be going off by then, but sometimes you tell yourself, "Oh, it was an accident," or "He's just playing a game." He's not - at least not any game you should be playing. The predator might pat you on the butt first, and then if you laughed or said it was okay after they said they were sorry, they might either pat you again, or try stroking your butt, or even putting their hand there and leaving it until you push it away - and the next thing you know, there's a hand in your crotch, or trying to make its way down your pants or up your blouse.
TRS Android App
TRS 3 point plan
Talk Real Solutions Radio Page
The views expressed on talk real solution hosted by Tyrone Thompson at blog talk radio are my own and do not reflect those of Blog talk radio, Youtube and etc . The content here belongs to the Talk real solutions and it’s many contributors. Views and opinions expressed by all contributors belong to them and not Talk real solutions or Tyrone Thompson, the blog owner, host and etc .
All data and information provided on this site is for informational purposes only. Talk real solutions makes no representations as to accuracy, completeness, correctness, suitability, or validity of any information on this site and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use. All information is provided on an as-is basis.
With Valentine's Day right around the corner, I thought we'd take time to cover the subject of cyberstalking with a "lover's twist." In this episode of Working the Web to Web, we're going to show you the latest and greatest, cute and cuddly, or otherwise disguised electronic eavesdropping technology that's designed to keep tabs on your every move.
So especially if you're in a relationship, you won't want to miss all the endearing ways your lover can eavesdrop on you. Or another way to look at it, "You only hack the ones you love."
On this episode of V-RADIO we will be talking to Jayne A. Hitchcock. Jayne is an expert on Cyberstalking and Cyberbullying and the author the book "Net crimes and misdemeanors.". We will be talking with Jayne about her organization called WHO@. "Working to Hault Online Abuse". Jayne will also be consulting for the upcoming "TROLL" Documentary.
I hope you will join us for this edition of V-RADIO.
THOUGHT HEARTBLEED MAKES YOU VULNERABLE? TRY CYBERSTAKING
Victims of domestic violence have to worry about what happens when their abusers are in the same house with them, and now they have to worry when their abusers are nowhere in sight. Technology is making stalking, bullying, controlling, and even spying a real threat to victims. NSA type tracking and monitoring doesn’t hold a candle to the intrusive ways abusers use technology to harass and strike fear in their victims. MobiStealth was used by a murderer to read his girlfriend’s text messages to learn of her plans to leave him. The CDC reports more than 8 million women have been stalked, and 81% of those women were physically assaulted.
Michele Garcia is the director of the Stalking Resource Center for the National Center for Victims of Crime, an organization that works toward education, promoting victim safety, and holding offenders accountable. She has 20 years of experience working for victims’ rights and domestic violence.
Join us Saturday as we talk about how technology is used to control and hurt people, the many types of technology being used by stalkers, and what you can do about it if you think you are a victim. Share your comments and stories with us, and let others know about this controversial show.
Tonight we interview a woman who claims she has been through hell and back at the hands of a ruthless cyberstalker. T, his woman posted information about her online, constantly harrases her, threatens her family and so much more. This woman has gone as far to get others to do her dirty work for her and harrass three seperate victims. Tonight this woman will discuss the loopholes preventing cyberstalking from being taken seriously by police, tips on how to deal with a cyberstalker yourself and how she is dealing with it emotionally.
"COINTELPRO" was the FBI's secret program to undermine the popular upsurge which swept the country during the 1960s. Though the name stands for "Counterintelligence Program," the targets were not enemy spies. The FBI set out to eliminate "radical" political opposition inside the US. when exposure, blatant harassment, and prosecution for political crimes failed. The Bureau took the law into its own hands and secretly used fraud and force to sabotage constitutionally- protected political activity. Its methods ranged far beyond surveillance, and amounted to a domestic version of the covert action for which the CIA has become infamous throughout the world
Due to the deaths caused; By cyberstalking and cyberbullying their have been laws passed to protect innocent victims from abuse of cyberbullying. We request a bill be put in place that once the internet provider is given evidence of cyberstalking, cyberbullying and harassment they must have so many days to remove the material or be held criminally liable.