Showing posts with label Predators. Show all posts
Showing posts with label Predators. Show all posts

July 25, 2016

Alarming Graffiti Message


I actually stopped to read and photograph this graffiti or should I all it a cry for help.

First of all the "artist" was considerate and put it on paper (that was taped up), and not directly on the street pole.

Second, there are some incredibly thoughtful, alarming, and prayer messages on this in both English (as well as in Asian, and Hebrew languages), such as:

- "Jewish prayer for no rape."

-  "Abusive bee." "Bee pose," "Queen bee," "Bee wisdom," and "Bee Sting"

- "Abusive spiritual teachers being arrested"

- "We are angelic"

- "I pray for diversity in the bee colony"

- "I pray for a well taught dog"

- "Goddess may the dog be happy"

- "Hashem [G-d] causes the generations to realize they are one"

- "Temple of the animist"

- "Freedom of religion."

- "Kosher U.S.A. Government"

- "Thanks MD/DC Service Dog."

There is more, but I couldn't make out all of it.

There is a also a drawing of a girl in a sitting position with her knees up and sort of smiling.

What strikes me most in this are the numerous references to some sort of abuse, likely sexual with the references to things like prayer for no rape, abusive bee, bee sting, bee pose, and abusive spiritual teachers being arrested.

I feel very unsettled by this, like someone is in trouble and this is a call for help from the community.

All the identification with religion, spirituality, and G-d make this even more significant in terms of the spiritual questioning and perhaps confusion from it all.

Also, is this person disabled/blind--note the reference to the service dog.

I hope that this person(s) are okay and that if they are in danger and need help: go immediately to your parents, the police, school authorities, or a social worker.

People in the community care, and especially G-d hears your prayers.

Whoever might be hurting you needs to be dealt with by the authorities, and please G-d, you will be alright. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

December 31, 2011

The Not So Candid Camera

When you're at the swimming pool, it's a time for swimming, splashing, and fun.

With family and friends, it's even a great time to catch some scenic photos of loved ones having a great time.

You expect to see cameras and smartphones taking some discreet pictures or videos.

Not a new problem, but some people take advantage of the people swimming or tanning to take compromising shots.

When people are knowingly scantily clad in public--people will argue what level of responsibility they have for the way they present themselves.

However, when others take advantage of that--let's be clear, the predator is the aggressor!

At the pool, I saw this taken to a whole new level today--and by someone and in a way I would not have expected.

This older-looking guy, with a hat on, strolls up to the pool with a huge tripod mounted video camera on a WALKER and starts taking rolling video on a pool almost exclusively filled with little children.

There was no warning, no request--"may I", no do you mind, just a video camera mounted on a walker at the head of the pool with lots of little kids, and also some teens, women, and more.

First, I watched to see what this guy was doing...then I thought, I better capture this and I took a series of photographs of the guy--who had no apparent compunction about invading everyones privacy.

But the story isn't over--it get's worse.

All of a sudden, I notice my computer picking up a wireless network with a name that self identified them with a clear inclination for child pornography (I am withholding the actual name so as not to tip off the criminal). I capture this too--with a screenshot. Was it the same guy with mounted video camera or someone else?

So much for a relatively serene vacation, and some quiet private time.
I just saw Dateline's "To Catch A Predator" early this week and I almost can't believe this is happening. I think to myself--is this real? Unfortunately it is.

I reported both incidents to hotel security. At their request, I email them the screenshot of the wireless network name that would make anyone cringe. Next call is to the National Center for Missing and Exploited Children and CyberCrime.com.

Normally, I believe in live and let live, but we all have to do our part to protect children and other innocent victims.

Share/Save/Bookmark

November 26, 2011

Espionage, Social Media Style

You are being watched!
Good guys and bad guys are tracking your movements, rants and raves, photos, and more online.
For example, The Atlantic reported on 4 November 2011 in an article titled How the CIA Uses Social Media to Track How People Feel that "analysts are tracking millions of tweets, blog posts, and Facebook updates around the world."
Further, in January 2009, "DHS established a Social Networking Monitoring Center (SNMC) to monitor social networking sites for 'items of interest.'"
And even more recently in August 2011, DARPA invited proposals for "memetracking" to identify themes and sentiments online and potentially use this for predictive analysis.
The thinking is that if you can use online information to predict stock market movements as some have attempted, why not criminal and terrorist activity?
Similarly, The Guardian reported on 16 March 2010 FBI using Facebook in fight against crime and cautions that "criminals dumb enough to brag about their exploits on social networking sites have now been warned: the next Facebook 'friend' who contacts you may be an FBI agent."
This is reminescent of the work of private sector, Dateline NBC in using Internet chat rooms to catch sexual predators online by luring them to a house where the predators believed they were going to meet up with a underage girl for a tryst.
While these efforts are notable and even praiseworthy by the good guys--assuming you can get over the privacy implications in favor of the potential to have a safer society to live in--these activities should be carefully safeguarded, so as not to infringe on the rights and freedoms of those who behave legally and ethically.
But the good guys are not the only ones using the tools of the trade for monitoring and analyzing social networking activities--the bad guys too recognize the implicit information treasure trove available and have you in their crosshairs.
For example, in the last years Arab Spring, we have nation states tracking their citizens political activities and using their power over the Internet to shut off access and otherwise surpress democracy and human rights. Further, we have seen their use for cyberspying and testing offensive cyber attack capabilities--only the most recent of which was the alleged infiltration of a SCADA system for a Illinois water plant.
Moreover, this past week, Forbes (21 November 2011) reported in The Spy Who Liked Me that "your social network friends might not be all that friendly."
From corporate espionage to market intelligence, there are those online who "steadfastly follows competitors' executives and employees on Twitter and LinkedIn."
In fact, the notion of online monitoring is so strong now that the article openly states that "if you're not monitoring your competitors activity on social media, you may be missing out on delicious tidbits" and warns that "it's easy to forget that some may not have your best intersts at heart."
Additionally, while you may not think your posts online give that much away, when your information is aggregated with other peoples posts as well as public information, it's possible to put together a pretty good sketch of what organizations and individuals are doing.
Forbes lists the following sites as examples of the "Web Spy Manual" with lots of information to pull from: Slideshare, Glassdoor.com, Quora, iSpionage, Youtube as well as job postings and customer support forums.
When you are on your computer in what you believe to be the privacy of your own home, office, or wherever, do not be deceived, when you are logged on, you are basically as open book for all the world to see--good guys and bad guys alike.
(Source Photo: here)

Share/Save/Bookmark

September 3, 2011

Weeding Out The Servant-Leader From The Psychopath

Psychopath-at-work

A number of weeks ago, I saw the movie Horrible Bosses, a dark comedy with Kevin Spacey who not only horribly mistreats his workers, but also ends up being a psychopathic killer. (Note: the film has already grossed over $170 million).

The UK Daily Mail (2 September 2011) reports that psychologists have found that "one in 25 bosses is a [real] psychopath' but hides it with charm and business-speak," and that this is 4 times higher than the prevalence of psychopathology in the general population.

According to Oregon Counseling, a psychopath "lives a predatory lifestyle. They feel little or no regret...[and they] see people as obstacles to be overcome and eliminated."

The position of a boss at work would seem like a comfortable perch for a psychopath to occupy, where they could feed off of vulnerabilities of their underlings.

Thank G-d, not all bosses are like this--I can vouch for some very good ones out there--who truly are devoted to the success of the enterprise and look out for their people. As one of my good bosses told me, "we are going to set up together to succeed!"

At the same time, there are other bosses out there, who as one of my best friends would say, "the wheel is still turning, but the hamster is dead." They are there purely for themselves--plain and simple. Their career, their success, their next promotion...everyone else is just part of the food chain.

If I had to guess, I would bet that narcissism is highly correlated with psychopathic behavior at work. Note--to organizational behavior researchers out there, please verify!

So how do the psychopaths achieve the positions of power?

According to the research cited in Daily Mail, they actually cover up their poor performance and climb the social corporate ladder "by subtly charming supervisors and subordinates."

In other words, boss psychopaths are chameleons--expert at hiding their true colors or as my father used to tell me if that person has two faces, why would they use that one? :-)

Boss psychopaths are NOT real leaders--they lack empathy, are callous, deceitful, and use others for their own gain.

When we are fooled by psychopaths into putting them into positions of power, we are falling prey to their manipulations, and are putting our organizations and people at the ultimate risk for failure.

One Psychologist calls psychopaths: "people without a conscience"--this is the complete opposite of who we need to seek out as leaders for our organization--to raise them up to higher standards of conduct, performance, and genuine teamwork.

A REAL leader is a caretaker of the mission and people of the organization who strives to see both outperform and thrive--while bottom-feeding is for sharks and psychopaths only!

There is a religious (Jewish) saying that from one good deed comes another--for the organization and it's people, focus on the demonstration of ethical and caring behavior and results.

When I see a truly great leader, I am am inspired and hopeful again.

(Source Photo: here)

Share/Save/Bookmark

April 10, 2010

Knowing Who Your Friends Are

You’re on the Internet doing your business, but who is at the other end and how do you know that you can trust them?

That is what so called Reputation Systems are all about—creating mechanisms to authenticate the identities of partners online and measure just how trustworthy they are or aren’t.

Some familiar examples of reputation systems include everything from scores for vendors on Amazon or eBay to activity statistics on Twitter to recommendation distinctions on LinkedIn to networks on Facebook.

The idea is that we measure people’s trustworthiness through the number of transaction they conduct, reviews and recommendations they receive, and associations they keep.

These are all instances of how we unmask the identities and intent of those we are dealing with online—we obtain 3rd party validation. For example, if a vendor has hundreds or thousands of transactions and a five star rating or 99% positive reviews or is a select member of a power seller” network or other select organization, we use that information of past performance to justify our current or future transactions or associations with them.

MIT Sloan Management Review, Spring 2010, has an article about reputation systems called “Online Reputation Systems: How to Design One That Does What You Need.”

According to the article, reputation systems are “the unsung heroes of the web,” because “they play a crucial role is building trust, promoting quality, improving collaboration and instilling loyalty.”

Without some way of knowing whom we are sending a credit card payment to, friending, or chatting with on the Internet, we would be violating the cardinal rule of safety that our parents and teachers taught us from the earliest time that we could understand that you “don’t talk to strangers.”

I remember a very good video for children produced by Service Corporation International (SCI) called “Escape School,” which taught just such lessons by Bob Stuber a former police officer and child safety expert.

Even as we grow up though the dangers from people criminals and predators still exist; hopefully we are a little older and wiser in recognizing it and dealing with it, but this is not always the case.

For example with online dating networks, people sometimes pretend that they are a rich brain surgeon or the proverbial “tall, dark, and handsome” physique to lure someone on a date, only to be exposed for who they really are upon the first date.

People are inherently driven to connect with others, and online we are able to connect easier then ever before—with people from all over the globe, virtually anytime of the day or night—and it is often tempting to let our heart lead and dismiss any concerns about who we are dealing with. Further, the veil of anonymity online seems to only heighten the opportunities for abuse.

The dangers of people pretending to be something they are not and the need for recognizing whom we are dealing with is an age old problem that society struggled with—from the snake oil salesman of time past to those occasional dishonest vendor on sites like eBay today.

The MIT article states “Small, tightly knit communities arguably do not need central reputation systems, since frequent interactions and gossip ensure that relevant information is known to all. [However,] the need for a central system increases with the size of the community and the lack of frequent interaction among members. In web-based communities with hundred or thousands of members, were most members typically know each other only virtually, some form of reputation system is always essential.”

Predators act out online everyday using social engineering to trick people into divulging personnel or organizational information, getting them to send money (like the fake emails from Nigeria or a lottery) or sending out malware when you click on the link that you know you shouldn’t be doing.

Another example with children is evident on NBC Dateline’s “To Catch A Predator” series where Chris Hansen stakes out the child predators who arrange meetings with kids in chat rooms on the Internet and then make their appearance at their homes or other meeting spots. Child predators prey on the fact that the children online don’t realize who they are dealing with and what their evil intentions are. Thank G-d, law enforcement and NBC has been able to turn the tables on some of these predators when law enforcement is pretending to be the vulnerable kids in order to catch the predators---who are fooled into thinking they are talking to children, only to be caught often literally “with the pants down.”

Whether we are socializing online, surfing the Net, or conducting some form of ecommerce, we must always pay attention to the identification and reputation on those we deal with. As the MIT article points out, with reputation systems, we can use ratings, ranking, and endorsements to build up information on ourselves and on others to build trust, promote quality, and sustain loyalty.

Of course, even with reputation systems, people try to manipulate and game “the system,” so we have to be ever vigilant to ensure that we are not duped by those hiding their true intentions or pretending to be somebody or something they are not.

As social creatures, optimists, and those of faith, we are tempted to just trust, but I prefer the motto of “trust and verify.”


Share/Save/Bookmark