Tag Archives: Internet

What is VoIP?

VoIP connecting to devices

Voice Over Internet Protocol AKA VoIP, is a method by which voice and multimedia sessions take place over the Internet rather than through a traditional phone service. Users also refer to VoIP as Internet telephony, broadband telephony, or broadband phone service, a service that is not new, but has been gaining popularity. Unlike plain old telephone service (POTS), VoIP does not need a service plan or a static telephone number. Anyone can use the system for free, from anywhere in the world.

Pros and Cons of VoIP

There are several pros and cons to using a VoIP phone number. The pros include being able to choose your own phone number, with any area code. People use VoIP for many reasons. The pros can be positive or negative in that the caller’s identity is usually blocked or unavailable. Users may opt to be anonymous for various reasons including personal or professional privacy or for developing targeted marketing services. Cons are that some users choose to hide their identity to protect themselves when they are involved in illegal activity. People use VoIP even though it can only be used with an internet connection or a phone’s mobile hot spot.

Hidden Identity

VoIP services only know what information you put in when you sign up, so it can be anonymous. The service asks for an email account, which can also be anonymous, so tracing the number may be almost impossible. Scammers use the system because it gives them cover from the police and prosecution reducing the risk of being caught.

Locating the Caller

You can trace a phone number by doing a reverse phone number search to find if the number is traditional or Internet-based. You may be able to locate an IP address for the VoIP number but unless you are highly tech savvy, chances are you won’t be able to uncover who is using the number. However, law enforcement has tools which may be able to locate the origin of the calls.

Google Voice is a popular VoIP service. While the service many be anonymous, Google collects and shares information with third parties that may help to track the caller. Google does not have a directory of its VoIP numbers, and such efforts would be pointless since the numbers can and do change all the time. You should use the following tips to track the number.

  1. Phone directories. You can use a reverse phone search to find the number, even if it’s a VoIP number. If you think the number is fake, you can check online phone directories to see if it has been reported.
  2. You can search Facebook to see if the person has linked the number to their social media profile.

Protecting Yourself

If you receive a call from a VoIP phone number, treat it as if it is fake. Never give out personal information to a stranger. You should report any suspicious activity to the police immediately.

Protecting Your Kids Online

Parents Protecting Children on the Internet

Everyone knows that you can’t have your eyes on your children 24/7, especially if they are in school and spending time away from home. Sometimes it must be enough to educate your kids as best as possible, exercise reasonable care, and hope for the best. Parents should teach kids how to be safe online, especially since children spent a great deal of time on the Internet. It’s true that kids are generally more tech savvy than their parents. But that tech know-how doesn’t have anything to do with being safe online. Kids are trusting and naïve. They need watchdogs to protect them.

Safe Sites

There have been safeguards for kids almost since the Internet was invented. However, those tech savvy kids can get around those blocks with little effort. Before turning your kid loose on the internet, set strict guidelines including the amount of time spent online as well as which sites are acceptable and safe.

Steps to Take

  1. Use safety features on websites. Let’s use YouTube as an example since it’s one of the most popular sites. If you’re using a desktop, scroll down to the bottom of the screen to the “Restricted Mode” setting. This setting will hide videos that contain inappropriate content. For the mobile app, click on the three dots (top right) to get to Settings > General. Scroll down until you see the “Restricted Mode” option.
  2. Set privacy controls on social media accounts. First, make sure that the children are old enough and mature enough to use social media. Discuss what is appropriate and limit who can see their posts.
  3. Use separate accounts for adults and kids.
  4. Set up separate accounts for your kids on your computers
  5. Use kid-safe search engines and browsers.
  6. Limit the time your child spends online.
  7. Use only safe chat rooms
  8. Teach your children not to talk to strangers. While great friendships can be made online, there is a great danger that children are being approached by predators. Teach kids to maintain a safe distance. If the stranger wants your child to call or text, iPhone app to see who a phone number belongs to and note it just in case.
  9. Teach your children about “sexting.” The Justice Department has stated that the biggest threat to children is something called “sextortion.” People send graphic messages or pictures which can cause lasting psychological damage.
  10. Avoid file sharing. Aside from being illegal, sharing files, e.g., music, videos, etc. can be a doorway to getting a virus on your phone or computer.
  11. Discuss cyberbullying. The National Academies of Sciences, Engineering, and Medicine have reported that cyberbullying affects up to 15% percent of children. The percentage is higher for kids who are minorities, disabled, overweight, or LGBTQ.

For more tips, visit the Federal Trade Commission’s Consumer Information website.

Cyberstalkers and Their Victims

Cyberstalking

Cyberstalking is the use of social media, phone calls, text messages, email, and other forms of technology to threaten, harass, pursue, intimidate or steal a person’s information for personal gain. For that reason, anyone who uses the Internet can be a target. Cyberstalkers are often driven by jealousy, anger, hatred, infatuation, revenge, and lust or obsession. Some might suffer from mental illness. Some cyberstalkers, known as Internet Trolls, will harass Internet users for no good reason. A cyberstalker could be a stranger, but most likely is someone the victim knows. The stalker could be an ex, someone from school, co-worker, someone with whom you’ve had an argument or fight, or even a fan or potential love interest.

The Four Types of Cyberstalkers

Cyberstalkers cause a lot of trouble for their victims with rumors, false allegations, lies, harassment, or even identity theft. Cyberstalking can include cyberbullying, which takes place between kids. Cyberstalking may also include inappropriate actions, including those of a sexual nature. Research has shown that there are four basic types of cyberstalkers. They are:

  • Vindictive: Cyberstalkers who want to get revenge or harm another person. They often engage in personal attacks;
  • Composed: Those whose want to annoy the victim;
  • Intimate: One who wants to have a relationship (friendship or love) with the victim. Therefore, cyberstalkers can turn violent if turned away;
  • Collective: A group of cyberstalkers who attack an individual or group for a specific cause.

The Harmful Result

Stalking causes a great deal of harm to the victim. It can ruin marriages, self-esteem, careers, or someone’s credit. Cyberbullies have been the cause of many children committing suicide. Obsessions can move from cyberspace to real-world stalking. Cyberstalkers may claim that they mean no harm, although what is being done may be extremely harmful and often illegal. Victims may not know they are being stalked. The stalker could use spyware or other means of tracking Internet use behind the scenes. You should increase your security if you think that you are being tracked in some way. Take extra precautions.

Precautions

Protect yourself by taking simple precautions. Regardless of how careful you are, it’s possible to become a target. However, you can avoid becoming a victim of cyberstalking, despite the method used to target you.

  • Restrict access to your computer, smartphone, and other devices. Leaving your computer open can allow hackers to alter the system and add software for tracking purposes.
  • Password protection. You should protect all devices with unique passwords to keep from being stalked. Use a web-based password vault to store passwords and change passwords often. Never use the same password for more than one program. Above all, avoid using passwords such as children’s or pets’ names or birthdays.
  • Sign out of computer programs when finished, especially on social media accounts.
  • Search your name online to see what information is available to the public. Do the same for family members.
  • Tell friends and family that you do not want your personal information on their social media accounts. Remove such info wherever possible.
  • Keep online calendars and plans private.
  • Post with care. If you post something, it is nearly impossible to take it back. This includes photographs.
  • Don’t announce travel plans or sharing where you will be on a certain date and time.
  • Use anti-virus, spyware, malware and anti-tracking software on all devices.
  • Teach children how to be smart about Internet use and to report any strange behavior immediately.
  • Don’t give out personal information such as your address, social security number, or bank information.
  • Hackers can obtain all information provided online.
  • Don’t get involved in online arguments.
  • Never open attachments from unknown sources.
  • Use screen names that are age and gender neutral.
  • Check the status of bank and credit card accounts on a regular basis.
  • Set up new emails for dating websites and social media accounts.

Cyberstalked? Now What?

If you see signs of cyberstalking, act right away. Police and other agencies often have cyber divisions that can help with the legal aspects of the crime and how to protect yourself.

  • Take suspicions seriously.
  • Report any possible illegal activity.
  • Avoid any contact with suspected cyberstalkers.
  • Record and block any email or phone numbers used to contact you with harassing messages. Use an iPhone cell phone trace app to check unknown numbers.
  • Change your account passwords.
  • Change email accounts.
  • Remove personal information on social media profiles and dating websites.
  • Reset privacy settings on all accounts and programs.
  • Delete online accounts if necessary.
  • Inform family and friends of the event.
  • Be aware of any real-life stalking activity.

In conclusion, it seems that cyberstalking is here to stay. However, if you are mindful, you can stay safe.