You prevent some of my Care2 comments from automatically posting at my Facebook account like today regarding police Tasering a legless, wheelchair-bound black man and a 78-year-old white man. (1) I asked police officers to please report when their partners do wrong. STOP abuse, even when the abusers wear a badge. (2) Cyberstalkers also stopped my comment from automatically going to Facebook when I warned people about the plan to equip SCHOOL POLICE with Tasers and turn them loose on our children, knowing that two 15-year-old Taser victims died within a month of each other in Michigan this year.
Cyberstalkers prevented those two comments I posted at Care2 News Network from automatically posting at my Facebook wall as they should. Cyberstalkers override my settings and THEY choose what can and cannot go to Facebook. Similarly, they stopped the RSS feed from my Sharebook although it is still set to feed!
Question No. 1 - Do we still have the Bill of Rights as law, or did they declare Martial Law yet? If freedom of press is still the law of the land, why is that right not uniformly protected? Like MLK said, America must "be true to what you said on paper." These cyberstalkers violate my pursuit of happiness, too, because I am very unhappy when they interrupt my freedom of press! Please make cyberstalkers stop censoring people, even those of us who dare speak against indiscriminate Taser use and prison profiteering.
My second question, Mr. or Ms. Cyberstalker, is this: When you prevent my comments at Care2 News Network from posting automatically to my Facebook wall, do you also prevent them going to the email boxes of Care2 members who elected to get email updates of the discussions at my articles? I know the settings members have for their accounts can be overridden quite easily without visibly changing the member settings, which means members never know what they missed! This is not limited to any particular Internet site.
I will have to remember to ask Care2 members about this on my cyberstalking videos. They can check in their emails and see if you did prevent those messages like you prevented them from posting at Facebook.
Is censorship practiced in America? "Only when there is something to hide." Don't hide wrongs, correct them!
In the months after 9/11, the Pentagon's research arm launched a controversial project known as "Total Information Awareness" - a massive database collating every available bit of digital information about, well, everything. After a public outcry, Congress defunded the project in 2003.
"But now, it looks like it's back, and this time in the hands of the FBI, under the name National Security Branch Analysis Center, or NSAC. A news report at Wired magazine says the NSAC has now collected more than 1.5 billion pieces of information, much of it from the private sector.
"And the data is being used "in hacker and domestic criminal investigations, and now contains tens of thousands of records from private corporate databases," Wired reports.
Massive FBI database set to quadruple in size!
Frankly, whereas I would appreciate being able to write online without spying, that is not what bothers me. Everyone should recognize by now that cyberspace is not a safe zone to put anything you do not want widely read. But I resent cyberstalkers who are not satisfied merely to spy - they get INVOLVED in what I publish. They delete links, prevent postings, remove what I already posted, prevent my RSS feed from this Sharebook, prevent Care2 News Network comments from going automatically to Facebook whenever they please, etc. JUST CHILL AND SPY, WHY DON'T YOU?My goodness!
Mary Neal P.O. Box 7222 Atlanta, GA 30357 MaryLovesJustice@gmail.com
<<The program, known as Conficker, uses flaws in Windows software to co-opt machines and link them into a virtual computer that can be commanded remotely by its authors.
With more than five million of these zombies now under its control — government, business and home computers in more than 200 countries — this shadowy computer has power that dwarfs that of the world’s largest data centers.>> Defying Experts, Rogue Computer Code Still Lurks
By JOHN MARKOFF It is still out there.
Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program and trace its origins and purpose, exposing serious weaknesses in the world’s digital infrastructure.
The program, known as Conficker, uses flaws in Windows software to co- opt machines and link them into a virtual computer that can be commanded remotely by its authors. With more than five million of these zombies now under its control — government, business and home computers in more than 200 countries — this shadowy computer has power that dwarfs that of the world’s largest data centers.
Alarmed by the program’s quick spread after its debut in November, computer security experts from industry, academia and government joined forces in a highly unusual collaboration. They decoded the program and developed antivirus software that erased it from millions of the computers. But Conficker’s persistence and sophistication has squelched the belief of many experts that such global computer infections are a thing of the past.
“It’s using the best current practices and state of the art to communicate and to protect itself,” Rodney Joffe, director of theConficker Working Group, said of the malicious program. “We have not found the trick to take control back from the malware in any way.”
Researchers speculate that the computer could be employed to generate vast amounts of spam; it could steal information like passwords and logins by capturing keystrokes on infected computers; it could deliver fake antivirus warnings to trick naïve users into believing their computers are infected and persuading them to pay by credit card to have the infection removed.
There is also a different possibility that concerns the researchers: That the program was not designed by a criminal gang, but instead by an intelligence agency or the military of some country to monitor or disable an enemy’s computers. Networks of infected computers, or botnets, were used widely as weapons in conflicts in Estonia in 2007 and in Georgia last year, and in more recent attacks against South Korean and United States government agencies. Recent attacks that temporarily crippled Twitter and Facebook were believed to have had political overtones.
Yet for the most part Conficker has done little more than to extend its reach to more and more computers. Though there had been speculation that the computer might be activated to do something malicious on April 1, the date passed without incident, and some security experts wonder if the program has been abandoned.
The experts have only tiny clues about the location of the program’s authors. The first version included software that stopped the program if it infected a machine with a Ukrainian language keyboard. There may have been two initial infections — in Buenos Aires and in Kiev.
Wherever the authors are, the experts say, they are clearly professionals using the most advanced technology available. The program is protected by internal defense mechanisms that make it hard to erase, and even kills or hides from programs designed to look for botnets.
A member of the security team said that the Federal Bureau of Investigation had suspects, but was moving slowly because it needed to build a relationship with “noncorrupt” law enforcement agencies in the countries where the suspects are located.
An F.B.I. spokesman in Washington declined to comment, saying that the Conficker investigation was an open case.
The first infections, last Nov. 20, set off an intense battle between the hidden authors and the volunteer group that formed to counter them. The group, which first called itself the “Conficker Cabal,” changed its name when Microsoft, Symantec and several other companies objected to the unprofessional connotation.
Eventually, university researchers and law enforcement officials joined forces with computer experts at more than two dozen Internet, software and computer security firms.
The group won some battles, but lost others. The Conficker authors kept distributing new, more intricate versions of the program, at one point using code that had been devised in academia only months before. At another point, a single technical slip by the working group allowed the program’s authors to convert a huge number of the infected machines to an advanced peer-to-peer communications scheme that the industry group has not been able to defeat. Where before all the infected computers would have to phone home to a single source for instructions, the authors could now use any infected computer to instruct all the others.
In early April, Patrick Peterson, a research fellow at Cisco Systems in San Jose, Calif., gained some intelligence about the authors’ interests. He studies nasty computer programs by keeping a set of quarantined computers that capture and observe them — his “digital zoo.”
He discovered that the Conficker authors had begun distributing software that tricks Internet users into buying fake antivirus software with their credit cards. “We turned off the lights in the zoo one day and came back the next day,” Mr. Peterson said, noting that in the “cage” reserved for Conficker, the infection had been joined by a program distributing an antivirus software scam.
It was the most recent sign of life from the program, and its silence has set off a debate among computer security experts. Some researchers think Conficker is an empty shell, or that the authors of the program were scared away in the spring. Others argue that they are simply biding their time.
If the misbegotten computer were reactivated, it would not have the problem-solving ability of supercomputers used to design nuclear weapons or simulate climate change. But because it has commandeered so many machines, it could draw on an amount of computing power greater than that from any single computing facility run by governments or Google. It is a dark reflection of the “cloud computing” sweeping the commercial Internet, in which data is stored on the Internet rather than on a personal computer.
The industry group continues to try to find ways to kill Conficker, meeting as recently as Tuesday. Mr. Joffe said he, for one, was not prepared to declare victory. But he said that the group’s work proved that government and private industry could cooperate to counter cyberthreats.
“Even if we lose against Conficker,” he said, “there are things we’ve learned that will benefit us in the future.”
Cyberstalking: A New Challenge for Law Enforcement and Industry
A Report from the Attorney General to the Vice PresidentAugust 1999
The new millennium is fast approaching, and the information superhighway is undergoing rapid growth. The Internet and other telecommunications technologies are promoting advances in virtually every aspect of society and every corner of the globe: fostering commerce, improving education and health care, promoting participatory democracy in the United States and abroad, and facilitating communications among family and friends, whether across the street or around the world. Unfortunately, many of the attributes of this technology - low cost, ease of use, and anonymous nature, among others - make it an attractive medium for fraudulent scams, child sexual exploitation, and increasingly, a new concern known as "cyberstalking."
"Make no mistake: this kind of harassment can be as frightening and as real as being followed and watched in your neighborhood or in your home."
~ Former Vice President Al Gore
(Read the entire article at the link above)
CYBERSTALKING IS ANOTHER CRIME THAT MUST BE ADDRESSED BY THE USDOJ, IF IT IS ADDRESSED AT ALL. I HAVE NO LUCK ASKING THE USDOJ TO INVESTIGATE CRIMES:
Lately my cyberstalkers have been removing the taglines for my Google bookmarks and switching the titles of the links. Also, there were more bookmarks yesterday than today, although I added some today. So, my Google bookmarks are like the petitions I launch whereon signatures are stolen. Oh, well. When the cyberstalkers' bosses hear what they do, they may get raises. Actually, I hope they get promoted to work on more important targets than myself! Here is a recommendation to help that happen soon.
Recommendation from Mary Neal
Sirs and/or madams, your cyberstalkers are working hard and doing excellent sabotage. They take over any computer I bring home in minutes and steal whatever they please from my hard drive. They usually take over the administrator's role and leave me with the authority of a guest, unable to load software. Therefore, I cannot order a cleaner. On the computer I stopped using last week, the cyberstalkers had disconnected the RESTORE capability, so I could not go back to a date before they loaded their spyware, special software, and viruses.
The cyberterrorism is very frightening, also - coffins, men with guns, and large, dead insects that are posted at networks I frequent. I don't know how you managed this, but the police and DOJ won't address my cyberterrorism and never even asked for the license numbers of the cars that accosted me at the Chevron station on 9/27/08.
I assure you that your cyberstalkers are very diligent and good at frightening people - especially the online death threats and kidnapping threats. I am so frightened of them and the in-person stalkers that I have remained home for over a year - a virtual prisoner. I even had my car repossessed, because it is hard to work with all of this happening, and some jobs require transportation. I recommend all of your stalkers highly to work on other human/civil rights activists to impede or prevent their efforts, especially those who advocate to decriminalizing mental illness and/or repeal capital punishment, like I do. They can replace the "www." with the word "primate" on the Care2 links to online submissions by other African American activists, like the cyberstalkers did to some of mine. That was very insulting, so your stalkers deserve a raise for doing it.
I pray that some day soon, you promote them to work against someone more important than a Georgia woman who only asked, "What happened to Larry Neal?" and respectfully requests that mental patients be transferred from prisons into hospitals or community care programs. Surely there are others more worthy of all the cyberstalking and in-person stalking than I. It has to be quite expensive. There seem to be so many assigned to just me! But if there are fewer than it seems, that's all the more reason to give them a raise and promote them to watch and terrorize someone more worthy of their expertise.
Mama's Day Cards You
Won't Find at the
a group of artis...
The largest genocide in
human history happened
where? Most people would
answer Germany, and the
Actually though, the
largest genocide happened
in the USA, with the
native American Indians,
with estimates of 19
million to 100 millio...
Radiation Study; Tokyo
Hayno, R.S., et al
of Adults and Children 7
to 20 Months After the
Fukushima NPP Accident as
Measured by Extensive
Surveys, Proc. Jpn....
accumulates in water
supplies after nuclear
bioconcentrates in fish
that live in fresh water
and salt water. Runoff of
fresh water from land
which has been
contaminated ends up
contaminating oceans, and
66 Atomic Bombs were
exploded on the Bikini
Island Atolls. Hundreds
of islanders were removed
from the islands, but not
from harms way. One
hydrogen bomb exploded
near the islands, and the
children played with the
dust from the bomb, as it
"Under our current law,
a suspected terrorist on
the FBI's No-Fly List
can't board an airplane
-- but they can still
legally purchase guns and
This loophole, known
Germany added more
solar panels in one
month, than the US did in
ONE YEAR. Nearly 1/3 of
Germany power output is
handled by bottoms up
solar energy during the
middle of the day. The
transition to a 100%
renewable energy nation
is in process. T...
According to the Old
Testament, which defines
all of the 'rules' of
traditional marriage, the
above examples are all of
the ways that couples can
What is the
bailing out or helping
people at the bottom, or
giving corporate welfare
to the top 1%? The
example of Iceland,
compared to the US,
provides us with a good
"Nobel prize winning
Visit NBCNews.com for
breaking news, world
news, and news about the
From the video above;
"the gun lobby and its
allies willfully lied
about the bill. They
claimed that it would
create some sort of big
brother gun registry,
even though th...