[identity profile] moth2fic.livejournal.com posting in [community profile] broadstairsbacc
This is addressed to a lot of people, mostly UK based, who belong to the Broadstairs Bacchanalia com or to the f’lists of the com members. It was handed out in print format to the attendees at the recent con and will be on the com’s site. It can be disseminated to anyone who might be having trouble with trolls or cyberbullying provided this introduction is included.

Although the information is based on some AO3 staff discussions and research, this should in no way be taken as an AO3 official handout. It consists mostly of a slightly edited version of a letter one of the Abuse team on AO3 has drafted for sending to the people who have been affected so far by the Hockey RPF trolling issue. (This was discussed in two presentations at the con and in general conversation on the beach etc.) Edited in the sense of removing personal/identifying information and adding a few words to make it intelligible to people who have not already submitted a report or are not in US or in Hockey rpf fandom. This advice is not complete and we welcome additions. It is also, of course, not limited to the current issue or fandom.

It is already becoming obvious that the Hockey rpf troll is spreading their tentacles, reaching other fandoms via commenting on works read by the Hockey fandom readers and writers. Coming soon to a fandom near you…

[Dear Users]

We’re working as best we can to resolve the issue of the Hockey RPF troll, although unfortunately at present our resources for doing so are quite limited.

We cannot act on any violations of our Terms of Service that take place outside of Archive of Our Own — this includes such external platforms as Tumblr or Twitter. The most we can do for you is attempt to give you suggestions on precautionary measures you can take.

Please note that these are only suggestions and nothing more. Should you have any new harassing activity which targets yourself which does take place on the Archive, please do not hesitate to contact us immediately — this we can act on.

If you feel that your personal safety is threatened or compromised in any way, please do not hesitate to contact your local law enforcement immediately.
The Department of Justice’s Computer Crime and Intellectual Property Section (or the CCIP, found here: www.justice.gov/criminal-ccips/reporting-computer-internet-related-or-intellectual-property-crime) will instruct you to contact your state’s local FBI office in cases of cyber harassment (this is of course operating under the assumption that you are an American user; I apologize if this is not the case): www.fbi.gov/contact-us/field/field-offices
However, most countries have similar instructions for people who are the victims of cyber stalking and cyber bullying and these should be accessible online.

Useful UK links
www.citizensadvice.org.uk/consumer/phones-tv-internet-and-computers/staying-safe/offensive-or-har... (scroll down to find cyber harassment)

So far we have been unable to get useful international links. Interpol are not, it seems, interested – and yet much cyber stalking and bullying crosses national boundaries.

We appreciate that for many people, reporting crime to the authorities will not be an option because of privacy issues. However, we felt it important to give you the links and information in case that is a route you wish or need to take.

Regardless of whether or not you involve local law enforcement, it’s recommended that you document anything that will help you build a case proving that yes, this individual has been targeting you and yes, it should be taken very seriously:
1. print out any harassing emails (along with the full email header).
2. print out and save any harassing instant messages and private messages.
3. save any harassing text messages (don’t delete them).
4. note dates and times of all harassment on paper.
5. keep any harassing and threatening letters and make copies of the letters.
6. keep any harassing and threatening voice-mail messages and phone numbers (don’t delete them).
7. save and print out any harassing messages or defamatory messages about you on social networking sites (e.g., Twitter, Facebook, etc.)
8. if applicable, write down & also bookmark the username and profile URL of person harassing you via social networking website(s).
(source: www.fightcyberstalking.org/report-cyberstalking-case)

The most valuable piece of advice we can give to you is to be mindful of who you share your information with! To quote from the X-Files, trust no one. The internet and the anonymity it offers is alluring, emboldening users to act out in ways they otherwise never would offline — only share information you would be comfortable broadcasting to strangers on the street. Disable the geolocation feature on all social media that you happen to use — we strongly recommend doing the same and disabling location services for mobile as needed. If you can, do this retroactively for any old posts you might have. Lock everything down if you can!

More online services are offering 2-step verification. Google offers an authenticator app which helps make the process slightly less difficult, although it’s still annoying. It might also be worth your while.

Some of the resources already sent to you mention data broker databases. This is very much ‘your mileage may vary’, but in general, removing your information from them isn’t worth the time. The reason for this is because:
1. There are a lot of these sites out there. (We wish we were kidding about that.)
2. The information that they list is all a matter of public record. Even if you were to go through with requesting removal, you would have to repeat the process on a somewhat regular basis. This is because data broker sites purchase public information en masse from relevant public govenment repositories.
3. At present, the American databases are not subject to any regulations, although there have been efforts to change that. (Even if you are not in America your data might be available there, for example if you have used online shopping sites or American-based social networks.)
Last but not least, it’s worth mentioning that some internet service providers offer additional services you might wish to inquire about. Comcast, for example, just started offering a new security feature this week as part of their Constant Guard tools. Cyber security has become more of a priority — your ISP may have additional security advice for you to consider.
Please feel free to contact us if you have any further questions or any information you wish to report. You can do this by submitting a new Abuse report using the link at the foot of each page in the archive or by emailing the team member who sent/gave you this information.

(In this case, you can initially contact [livejournal.com profile] moth2fic via LJ messaging service (or DW - same user name) rather than involving AO3 unless you want to make an official report)

Other links, some of them overlapping.
1. http://sqreceipts.tumblr.com/post/124480017379/the-hacking-of-ethan-8 which is seriously scary

2. http://www.fightcyberstalking.org/report-cyberstalking-case/

3. http://ohdeargodbees.tumblr.com/post/99694581114/what-to-expect-when-youre-expecting-the-internet

4. http://www.justice.gov/criminal-ccips/reporting-computer-internet-related-or-intellectual-property-crime - probably overkill but you never know!

Please disseminate this widely but make sure you keep the intro. I've chosen public as the security option so you can send people here or copy paste it wherever you like.


broadstairsbacc: (Default)
Broadstairs Bacchanalia

July 2016

242526272829 30

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Sep. 21st, 2017 09:22 pm
Powered by Dreamwidth Studios