Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

If your child does experience some form of exploitation whether mild or severe, it is

crucial to be 100% supportive, make it clear that it is not their fault and that you are
there to help and protect them no matter what

What is Internet abuse?


Internet abuse is an activity that involves the use of the Internet in an abusive manner. It consists
of threats and harassment, viruses, spamming, port scanning, hacking, DOS attacks, and
copyright infringement.

How do I report an incident of Internet abuse?


In order to report an Internet abuse, it is recommended that you provide evidence in the form of a
firewall log or email header.
The types of Internet abuse that requires evidence using an email header are threats and
harassment, spamming, and phishing email. Follow the steps below to report the incident:
1. Examine the email header. The email header information is necessary to identify
where a message originated from. Click Here for instructions on how to view the email
header.
2. Locate the offending IP address. Read the email header from the bottom up. The first
"Received" line should indicate the IP address and timestamp. The IP address and
timestamp should be included in the complaint.
3. Determine who is responsible for the IP address. Go to http://whois.arin.net and enter
the offending IP address into the ARIN WHOISRWA search box. Most organizations
have abuse contact information listed under the Point of Contact section.
4. Send the evidence to the organization responsible for the IP address. If the offending
IP address belongs to Charter, report the incident to abuse@charter.net. If the offending
IP doesnt belong to Charter, report the incident to the owner of the IP address. Be sure to
include in the complaint the full email header.
Note: We cannot process an abuse complaint unless it includes the full email headers.
The types of Internet abuse that requires evidence of firewall or server log are port
scanning, DOS attacks, and hacking. Follow the steps below to report the incident:
1. Examine the firewall or server log. The firewall or server log will contain the activity, the IP
address, and the time stamp of which the abuse occurred. Refer to your firewall vendor by
contacting or visiting their website for help in reading the firewall log and finding the date and
time of the abuse.

2. Locate the offending IP address. Read the firewall or server log to determine the IP address
and time stamp.
3. Determine who is responsible for the IP address. Go to http://whois.arin.net and enter the
offending IP address into the ARIN WHOISRWA search box. Most organizations have abuse
contact information listed under the Point of Contact section.
4. Send the evidence to the organization responsible for the IP address. If the offending IP
address belongs to Charter, report the incident to abuse@charter.net. If the offending IP doesnt
belong to Charter, report the incident to the owner of the IP address. Be sure to include in the
complaint the complete firewall or server log.
Note: Charter cannot process an abuse complaint unless it includes a complete firewall or
server log that contains the evidence of abuse.

How do I report a copyright violation?


If you believe that a Charter IP address is violating your copyright claim to original material such
as a song, film or software, please report the incident to dmca@charter.net. You must be the
copyright holder to file a DMCA notice. Please comply with the standards of the Digital
Millennium Copyright Act (DMCA).

What should I do if I am threatened over the Internet (via email, chat, or other
form of online communication)?
If you are threatened over the Internet:

Do not respond to the threatening or dangerous email, chat or other communications.

Do not delete the offensive or dangerous email. Instead, turn off the monitor and contact
local law enforcement.

Report the incident to your local law enforcement agency, as you would any other crime
committed against you.

back to top

How To Respond
What should I do if I am threatened over the Internet (via email, chat, or other
form of online communication)?
If you are threatened over the Internet:

Do not respond to the threatening or dangerous email, chat or other communications.

Do not delete the offensive or dangerous email. Instead, turn off the monitor and contact
local law enforcement.

Report the incident to your local law enforcement agency, as you would any other crime
committed against you.

What should I do if I am the victim of identity theft?


If you believe that you have been a victim of identity theft, take the following steps immediately:
1. Place a fraud alert and/or freeze on your credit report. For more information, click Here.
2. File a report with the three major credit reporting agencies:
1. Equifax
PO BOX 740241
Atlanta, GA 303740241
Phone: 18005256285
Website: www.equifax.com
2. Experian
PO BOX 9532
Allen, TX 75013
Phone: 18883973742
Website: www.experian.com
3. TransUnion
Fraud Victim Assistance Division
PO BOX 6790
Fullerton, CA 928346790
Phone: 18006807289
Website: www.transunion.com
3. Close any accounts that you suspect were involved in the scam. Immediately call and
speak to the fraud or security department at each company. Making this a priority will
ultimately reduce your liability. Follow-up each call in writing. Send letters as certified
mail with return receipt requested. This will enable you to prove that the companies
received the letters.
4. File a police report with your local agency, and get a copy. Financial institutions
especially require a copy of the police report in order to continue with their investigation.
5. File a complaint with the Federal Trade Commission. You can file a complaint on line
and get more information on identity theft by going to www.ftc.gov/idtheft.

6. If you discover that your credit card was used to pay another Charter customer's bill
without your permission, or if you believe you were otherwise the victim of identity theft
regarding your Charter account, please visit www.charter.com/idtheft for more
information.
back to top

Email
What is an email header?
Complaints cannot be processed unless you send us a sample that includes full email header. An
email message consists of two major sections:
1. Body: The message itself, sometimes containing a signature block at the end.
2. Headers: Contains the sender (From:), receiver (To:), summary (Subject:), and other
information about the email.

From: Contains the email address of the sender of the message. Just beware the From:
line can be easily forged.

To: Contains the email address of the receiver of the message. The "To" header in the
message is not necessarily related to the addresses to which the email is delivered. The
actual delivery list is supplied in the SMTP protocol, not extracted from the header
content. The "To" header is similar to the greeting at the top of a conventional letter that
is delivered according to the address on the outer envelope.

Subject: Contains a brief summary of the contents of the message.

Date: Contains the local time and date when the message was originally sent.

Other common headers include:

Cc: Carbon copy works like an old fashion carbon paper that's use to make duplicate
copies of a typed letter.

Received: Tracking information generated by mail servers that have handled a message.

Content-Type: Information about how the message is displayed, usually a MIME type.

Note: Most organizations have a dedicated machine to handle mail, called a "mail server". This
machine acts like a hub for email messages. When a user sends mail, the message travels to the
ISP's mail server. The mail server delivers the message to its destination which is another mail
server. It then sits on that second mail server until the recipient retrieves the mail.

How do I view the full email header?


Follow these steps to view the full email header:
1. Charter Web Mail

Right-click on the message subject from the list.

Click View Source.

2. Windows Mail

Click on the folder that contains the email message.

Right-click the email message and select Properties.

Click on Details tab.

3. Microsoft Outlook

Click on the folder that contains the email message.

Right-click the email message and select Options.

The header is the test in a box at the bottom of the window.

4. Outlook Express

Click on the folder that contains the email message.

Right-click on the message and then select Properties.

At the top of the window, select the Details tab.

5. Apple Mail

Double-click on the message, choose View.

Select Customize Headers and drag the Show Headers icon into your toolbar.

6. Microsoft Entourage

Double-click on the message, select the View menu.

Click Internet Headers and use your mouse to pull down on the line below the header so
that the entire header is visible.

7. Microsoft Outlook Express for MAC

Select the message

Click on the View option on the main toolbar.

Select Show Internet Headers option.

but before we go into the matter, let us give you some context. Recently, actress and TV
presenter Shruti Seth was harassed on Twitter for expressing her opinion about the PM's
#selfiewithdaughter campaign. Soon after that, activist Kavita Krishnan was mercilessly trolled
on social media for calling Modi a #lameduckPM.
Cut to present day, and actress Neha Dhupia is being literally stalked on Twitter for this tweet she
put up yesterday:
Neha duphia: One rain n the city comes to a standstill. Good governance is not
about selfies n makin us do yoga ,it's making sure ur citizens r safe.

People are saying things like: Neha Dhupia is trending for funny reasons. I would have
liked her to trend for her role in "Raat Gayi Baat Gayi?"

And this: st Shruti Seth & now Neha Dhupia. Apart from criticising Modi, can't all Cgrade actresses find some other way 2claim Few-Hours-Fame on net

Before you trolls begin your good work here too, here is some information you may want to read
about:
According to the Washington Post,
The men most likely to harass women online are the men most likely to have their own
problems.
Researchers Michael Kasumovic and Jeffrey Kuznekoff, from the University of New South
Wales and Miami University, respectively, conducted a test among a bunch of men and
women playing the popular videogame Halo 3.

What they discovered was significant:


As they watched the games play out and tracked the comments that players made to each other,
the researchers observed that no matter their skill level, or how the game went men tended
to be pretty cordial to each other. Male players who were good at the game also tended to pay
compliments to other male and female players.
Some male players, however the ones who were less-skilled at the game, and performing
worse relative their peers made frequent, nasty comments to the female gamers. In other
words, sexist dudes are *literally* losers.
Check out the graph that explains this behaviour:

Halo Chart
How can this be connected to what we're talking about, you ask?
According to Kasumovic, Halo 3 actually "makes incredible proxies for studying real-life
behavior."
...Kasumovic suggests, a recent influx of female participants has disrupted a pre-existing social
hierarchy. Thats okay for the guys at the top but for the guys at the bottom, who stand to lose
more status, thats very threatening. (Its also in keeping with the evolutionary framework on
anti-lady hostility, which suggests sexism is a kind of Neanderthal defense mechanism for
low-status, non-dominant men trying to maintain a shaky grip on their particular caves
supply of women.)

(emphasis ours)
As men often rely on aggression to maintain their dominant social status, Kasumovic writes,
the increase in hostility towards a woman by lower-status males may be an attempt to disregard
a females performance and suppress her disturbance on the hierarchy to retain their social
rank.

Five Types of Internet Abuse Used to Cyberbully


You might look at the internet in private, but anything you share can quickly become very public.
Knowing these five types of internet abusewhich have been used by cyberbullies to embarrass,
exploit and harrass othersas well as strategies for protecting yourself against them, can help
you avoid running into problems.

1. Social Exclusion
Social exclusion might be one of the mildest forms of cyberbullying, but it can cause serious
distress: it's the online equivalent of leaving someone out of a group to which they should expect
automatic membership. This could include an entire class not accepting a friend request from a
particular classmate.
Tip: Focus on developing real-life relationships rather than depending on virtual relationships
for social connection. If you or your child is being excluded online, this is probably an indication
of a more serious social problem in real life. Talk to your parents, teachers, or a counselor if
you're being socially excluded at school. Joining online or real-life groups based on your
interests, hobbies, or activities is also helpful.
2. Tagging Without Permission

Tagging is a way of attaching a person's name to an online image so that her name appears on the
image, or so that images of a particular person can be identified by searching for tagged images
using her name. Tagging someone's name against an embarrassing, defaming, or manipulated
imageparticularly without her permissionis a form of internet abuse, especially when the
intention is to cause that person distress or ridicule.
Tip: Limit and censor images that you post of yourself, and that others post of you. Go into the
privacy settings of the website you are using and adjust them so that tagged images of you
cannot be seen by others. You may also be able to block specific people from accessing any
information about you. If your image has been posted on a website, contact the website
administrator and request that it be taken down. If the image is pornographic, you may be able to
report the abuse to the police, although some teens have found themselves in trouble for others'
posting sext images of them online.
3. Flaming

Flaming is the practice of posting derogatory comments about another person. It can include
outing another person by revealing that he is gay when he hasn't come out himself; character
assassination by berating someone's character throught exaggerating her perceived faults in an
unbalanced way; or posting up untrue information about someone in order to damage her image
or reputation.
Tip: Although abuse is never the fault of the victim, you can reduce the likelihood that it will
happen to you by conducting yourself appropriately online, avoiding provoking negative
reactions in others by comments you make, and treating yourself and others with respect. At the
very least, any flaming that does happen will be unsubstantiated and unconvincing. And if it does
happen, report abuse to the owner of the website; webmasters are increasingly aware of internet
abuse and have moderators who can remove offensive material.
4. Sext Re-Posting

Sexting is a risky activity, but when you are in a relationship, you can be drawn into sexting a
picture of yourself to your loved one without thinking about the potential future risk of its being
used against you.
Younger internet users, especially teenage girls, can also be flattered into sexting images of
themselves, or flashing on a webcam, by predators, pedophiles, and pornographers who can use
these images for cybersex. This is known as coercion, and is a form of internet abuse. While you
may feel embarrassed by such images of you being made public, it is not your fault. Ask them to
take the image down, and if they do not, report it to the website as being posted without your
consent. If they continue to leave it online, and especially if they are harassing you in any other
way, report it to the police.
5. Impersonation and Identity Theft

Impersonation is pretending to be someone else, and can range from obvious mockery to actually
borrowing or stealing someone's identitysuch as their name, image, or identifying information
to carry out actions which are attributed to the victim.
Tip: For superficial impersonations, such as someone posting up a silly comment online using
your name, simply adding a comment below stating that it was not made by you might be
enough. For more serious impersonationscomments which indicate controversial views you do
not agree with, for exampleyou can contact the webmaster and ask to have it removed. And if
your personal information is used to commit theft or another crime, you should either confront
the culprit to correct the matter, or report it to the police.
These days Googling and Facebooking are as common daily activities as shaving and sleeping,
and all over the world, the amount of time that college students devote to the Web is increasing.

You might also like