Monday, December 05, 2005

Reflection on Writing my first paper in ENG 200

(during September 2005)

I had a hard time starting the dam paper. I couldn't figure out what I wanted to write about. I can tell you that I had information on the issue of Internet fraud, already. I didn’t really feel motivated to start writing the paper. The teacher got mad at me because we needed an outline and thesis by Wednesday. I said to my self, sugar! (But) I talked to him about it, after class. I had a hard time with how I was going to structure the paper, but after talking to Will, I had a focus of what I wanted to do, considering that I didn’t follow my outline exactly as planed. Well, when I started thinking about the paper, I had too much on my mind about my personal problems that I was having with identity theft. During the first week of school I already lost my social security card, two weeks later, someone had stolen my cell phone on the city bus. When I talked to Will, he reminded me of what I wanted to write about in the first place, and I felt that was my motivation to start writing the paper. During the time that I was looking for information on Internet fraud, I would find more stuff about scams and people trying to get personal information from our computers. I had a lot of decisions to make on, if I wanted to include back ground information about hackers, the different types of frauds that are out there, but time was limited and I had already included a lot of important information. I didn’t talk about how to keep yourself safe in cyberspace, but what I did, was that I told my readers if they wanted help go to a specific web site or article that could help them, to make the paper more interactive, and not passive. I don’t know if that was a good idea, but I feel that I never finished, because I had not set a conclusion on the information that I talked about, on help to bring something across to the reader that would help them figure out the problems that I mentioned in the paper!

Letter to Will

Gene F. Brady Jr.
ENG 200 01L
8/31/05

Dear Will,

I’m not all that enthusiastic on the idea of cyberspace. Learning about the bad things that happen there, like losing your identity, people trying people’s checking account numbers, and funding for terrorism on the net! I think cyberspace an easier way to do crime, like asking a stranger to me you somewhere and the next day there’s a report on “A Girl Miss Near Park” or something like that. Also, it’s easy for kids today to look up pornographic pictures or get a hold of pornographic pictures without paying for it, and nasty people, putting child pornography on the net. Crimes are happening and no one is stopping these kinds events from happening. Recently, I was a victim of identity fraud three weeks ago because of an offer that was offered to me through the Internet. Someone or some “company” got a hold of my credit number and kept charging me for what I previously bought on the web. Its ailing, on how people can get into your computer from event another country or state, and ruin your life.

Based on my personal desires, I want to be a harder worker than I am. I believe in some of the past English classes that I have taken, I could have worked a lot harder. I’m a person of great integrity. Strong minded, sometimes not in the likely sense when I get mad or faced with an unlikely situation that’s not favoring of. I don’t get mad very often, but when I do, I tend to blow up. I can confess that I have an obsession for things being orderly. I have this crazy idea, that everything has an order to it, like putting dishes in the dishwasher in which they can fit; packing boxes into a car or van so that everything can fit. I don’t believe in wasting space. I believe that everything has a place. I hate being rushed into doing things, and being late on handing in a paper, paying someone money, or going somewhere in a car. I like that saying, “It’s better to be safe, than sorry!” I want to learn to become a better writer, and I want to improve on my strengths and weaknesses.

Some of the strengths and weaknesses that I have as a writer tend to put restrain on my capability as a writer. By looking back on some of the classes I took for English, I knew that I had problems with my grammar and structure, and I don’t really do much to improve on it. I was embarrassed to look over some of the work I’ve done. I couldn’t believe that I didn’t even ask the teacher for extra help. There was something else that was weighting me down, my reading disability.

I hated the fact that I had that labeled upon me. I didn’t want to believe it. Living with a problem that I didn’t believe in. I thought to myself, “I was fine in middle school, getting A’s in writer’s lab and language arts.” Everyone I thought, in the way, was kind of putting me down. My parents made me take classes in high school that I didn’t want to take, one’s with helpers. I thought it was bullshit. I know that they were there to help me, but I wanted to feel normal, I wanted to be in a regular class, with regular kids. It was hard for me to accept my disability.

During my first three semesters in college, my parent’s thought the extra help with the DRO would help me, but I felt that it didn’t. The weekly meetings with the DRO Specialist once a week, the time spent was worth nothing, because all I was getting from them was negative feedback. It’s hard when someone tells you to your face, that you have to this or that, or you’re not going to amount to nothing. I know that no one wanted to be cut down by anyone. I regret my lack of effort towards the people in my life that wanted to help me. I know now that, what happen to me, happened for a reason. I felt like that experience made me stronger to want to try harder. I think the best thing that someone said to me in college is, “Just keep on writing Gene, that’s the only way your going to get better.” I believe I was at my last one-on-one meeting with my poetry-writing teacher Jeff Mock, during the spring of 2003.

It wasn’t until my 2003 fall semester, when I really started getting into reading. I really didn’t have a big interest in reading novels, ones with more then 300 plus pages. That all change with I got into English 217, the political imagination, with professor Cynthia Stretch. During the semester, the first two novels that the class had to read were, The Handmaid’s Tale, by Margaret Atwood and Kiss of the Spiderwoman, by Manuel A. Puig. At first, I wasn’t all excited about reading novels, but when I started reading those particular books I was hooked. I fell in love with the novel Kiss of the Spiderwoman, by Manuel A. Puig. When I started getting deeper into the stories, reading that particular book, Kiss of the Spiderwoman, the words started to take me in like if I was in a movie. I could see what the characters in the book could see, by each small, tiny description that Manuel A. Puig laid out for me. I could start to feel the emotions, the drama, and their pain that the characters were experiencing. I felt like I was there with them, going through their agony and struggles. Reading became my newfound obsession. I wanted to keep on reading, because I wanted to know what was going to happen next. I felt, in-a-way for the first time, that the character’s struggles became my own. Reading started to become fun!

Whatever I get myself into, I want the experience to be worth wile like the time spent during my years in college with my friends and advocators. I respect and honor the aspects of what’s contained in the syllabus. As a teacher, you explained what you wanted and what you aspect out of the class very skillfully. It’s not the longest English syllabus that I had seen, but it offers a great deal of important information that this class needs to know to get through this semester. I know that this paper exceeds over three pages, but I wanted to speak to you from my heart. I want to be more serious about writing, and think this class will help me find my self-intellect. I’m definitely interested in what this class has to offer, and excited to know what we can learn from this experience this semester. I’m a person that wants to work hard to achieve goals in life, and I thank you for your time.

Sincerely,

Gene F. Brady Jr.

Saturday, December 03, 2005

Becoming Aware of the Interactive World of Cyberspace



(Unfinished Essay)

From reading literature works from Benjamin Woolly, Sherry Turkle, and John Perry Barlow, I learn that we should question the ideas around us, or acknowledge them.
To spell the butter on the meaning of cyberspace, I looked towards Benjamin Woolley’s rationale on what he believes cyberspace to be. He tells us that cyberspace means the study of control, in which he says, “-‘cyber,’ meaning steersman, coming from ‘cybernetics,” study of control mechanisms.” (Woolley, Cyberspace) Woolley expresses the ideas from Marshall McLuhan, in which he says, “One interpretation of cyberspace is that it concerns the annihilation of space.” McLuhan’s idea of the Western world and how it imploded, I believe that in a sense, pornography become revolutionary towards how it invaded the Internet.

In McLuhan’s observation on how technology is an extension of our bodies and John Perry Barlows idea as cyberspace being a new frontier, Woolley tells us that, “Perhaps cyberspace, then is-literally-where the money is. Perhaps it is also the place where events increasingly happen, where our lives and fates are increasingly determined; a place that has a very direct impact on our material circumstances-…” (Woolley, Cyberspace) Maybe if Woolley is right, based on the idea that cyberspace is where the money is, maybe that’s why pornography is becoming so successful. On the other hand, maybe cyberspace is not where the money is, but where pornography can be easily accessed. (16) Benjamin Woolley says that, “The power of this real comes from its connectedness.” (16) That idea of cyberspace being a connective globe community with millions of people talking, interacting, making business transactions, and a place where business keep their personal information. (11-15) Woolley even expresses the idea of comparing a biological virus with a computer virus, in which they both deals with codes and strands of information like a virus. (12)

I had my own problem at home with people trying to break into my Compaq home computer, time and again. I had to change my American On-line password about three times because someone some how got into my AOL account number. My family also had to buy a new computer, because the one that we had, a lot of the programs on the disk top were not functioning right. Every time, I would go on the computer it would freeze, because the space on the disk top seem to be limited. I don’t know what cause it, or how it happened, maybe it was one of those pop-up windows that said that our computer was infected, when it wasn’t? I asked myself, why would people do this? Is it because other people have access to our home computer like Benjamin Woolley explains?

From the article “Staying Safe in Cyberspace,” by Lawrence R. Rogers, Senior Member of the Technical Staff, of the Software Engineering Institute at Carnegie Mellon University, 2003, says that, “Your home computer is a popular target for intruders, because they want what you may have stored there: credit card numbers, bank account information, personal background information, and anything else they can find. With such information, intruders can take your money, even steal your identity. But it is not just money-related information they may be after. Intruders also want your computer's resources, meaning your hard disk space, your fast processor, and your Internet connection. They use these resources to attack other computers on the Internet. In fact, the more computers an intruder uses, the harder it is for law enforcement investigators to figure out where the attack is coming from. If intruders can't be found, they can't be stopped, and they can't be prosecuted…Intruders go after home computers because typically they are easy targets. When connected to high-speed Internet connections that are always turned on, these computers are all the easier for intruders to find and attack.” (http://usinfo.state.gov/journals/itgic/1103/ijge/gj07.htm)

Rogers tells us how intruders break into our computer in saying, “In some cases, they send you e-mail with a virus. Reading that e-mail activates the virus, creating an opening that lets intruders see what is inside your computer. In other cases, they take advantage of a flaw or weakness in one of your computer's programs -- a vulnerability -- to gain access. Once inside, they often install new programs that let them continue to use your computer -- even after you have plugged the holes they used to get into your computer in the first place. These so-called backdoors are usually cleverly disguised to blend in with the other programs running on your computer.” (http://usinfo.state.gov/journals/itgic/ 1103 /ijge/gj07.htm)

From “Identity Crisis,” Sherry Turkle mentions that, “Our need for a practical philosophy of self-knowledge has never been greater as we struggle to make meaning from our lives on the screen.” (91). Turkle tells us as we become more involved in cyberspace with our personal personas, we will learn how to adjust ourselves in life, through cyberspace. Can I believe this to be true? If we can adjust ourselves in our real life, then maybe we can do it in cyberspace! The reason I think people wanted to become members of various Internet websites, chat rooms, and web-shop websites like eBay and Amazon.com, is because I believe that people want to find a place of comfort. But how can we be sure that the website we go to is a safe one?

Sherry Turkle tells us truthfully from “Identity in the Age of the Internet,” that, “...for many of us, cyberspace is now a part of the routines of everyday life.”(5) I see myself spending more time on the Internet, then talking on the phone or reading a book. In the cyber age, it seems that a lot of what I do depends on the use of computers. I know from my personal knowledge, that some of my family members including myself buy things from the Internet like cloths, music, shoes, concert tickets, and set up traveling reservations. We also use the Internet to pay bills, send e-mails, do homework for class, and do research about a specific subject like learn about the city of Rome. We can even talk to our girl friends or buddies on-line without having to pick up a phone.

“From Pencils to Pixels: The Stages of Literacy Technologies,” by Dennis Baron, an English professor at University of Illinois, he tells us that “Technology raise the specter of digital fraud, and the latest literacy technology is now faced with the task of developing new methods of authentication to ensure confidence and trust in its audience.” (28). Denis Baron points out that, “The average reader is not equipped to detect many kinds of document falsification, and a lot of text is still accepted on trust. A writer’s reputation, or that of a publisher, predisposes readers to accept certain texts as authoritative, and to reject others. Provenance, in the world of conventional documents, is everything. We have learned to trust writing that leaves a paper trail.” (29). I wanted to mention this because I believe a lot of information that pertains to information in Cyberspace can be misleading or phony like pop-up ads, On-line Auctions, and Business opportunities sent by e-mail. We should know what kind of Internet frauds are out there in cyberspace, but how are we suppose to know if we’re not computer literate?

From my personal experience, I found out that nothing is free in cyberspace; I had to find that out the hard way. As of August and September of 2005, I became a victim of identity theft and Internet fraud. I responded to a pop-up banner that was offering something for free. I was stupid enough to buying something free in which I gave them my debt card number, home address, telephone number, name, and e-mail address. I signed-up for a free two-disc Spanish learning set that I wanted because I was taking a Spanish class. There was only a shipping fee that was only $6.95. I only paid once, and in span of two months the company charged me two additional payments of $59.95. The first additional payment was made on August 12, 2005. I told my bank that I didn’t make that transaction, and I had to pay and overture fee in which I went over the amount that I had in my checking account. I was so fucking pissed off; I felt that I just wanted to kill someone! My step-mom wrote back to the company and I received a refund from Advantagelanguage.com on the 24th of August. On the 15th of September, that dam company billed me again for the same amount of $59.95, in which I had refund a month early. As of Saturday, September 24th, 2005, I had to close my checking account so the company would stop charging money from my account.

In another incident dealing with the problem of being a victim of a scammed, I reported my problem to the Federal Trade Commission, in which their complaint service “provider,” Automated Transaction Corporation, billed me for improperly charges. They told me in the billing statement that I had to pay for Entertainment Services that I didn’t even know that I used or signed-up for, for $149.64. In an article I found about the Automated Transaction Corporation, “Deceptive Billers Agree to Settle FTC Charges” that the company was billing costumers for services they had not requested, authorized, or received. I had to find out the hard way, in which I thought they could help me, but almost falling victim to the company’s deceptive billing practices, I had the right not to pay (in which I didn’t). In the bill, the company wanted me personally, to pay the bill by credit card or check. They didn’t want me to pay cash! If I did, the company can get a hold of my checking account number and charge me for something that I might not want to pay for. I thought that the Federal Trade Commission could help me, but I didn’t read the article close enough about “The Rising Tide of Internet Fraud,” posted by the US Attorney’s Bulletin, by Jonathan Rush. The Federal Trade Commission was one of the company’s that was receiving Internet complaints about their web services, and I clearly didn’t catch that right away.

In trying to contact the Automated Transaction Corporation by phone, I didn’t get a quick response by them. I called about three times, and all I got was, just people putting me on hold. I felt that the phone service was trying to avoid me, in everyway. I even tried to call the help number on one of the company’s so-called “billing process” Websites. I called (954) 453-9000 that was on the screen as a contact service help number, and the phone operating messaging service told me that the number I called was no longer in service. I was shocked, and fucking pissed off. I even tried to contact the IFCC, the Internet Federal Complaint Center, but they e-mailed me and said that they have too many complaints, and they couldn’t help me.

There was also the problem that I had with logging-in at home, trying to get into certain websites. My step-mom was complaining about that she couldn’t do any of her banking on-line, she couldn’t get into her EBay accounts, and other accounts that she had set up on-line. The incident left me in a state of anxiety, in which both incidents with trying to log on at home and informing the Automated Transaction Corporation. My step-mom thought I did something to the computer, in which I didn’t. I thought that it must have been the Automated Transaction Corporation had to do something with it. I still don’t know if that issue is resolved at home. It’s hard for me, to learn the hard way about becoming a victim of Internet fraud or becoming aware of the possibilities that I had to deal with. I have been having constant worry about someone having my personal information and using it against me. You have to know what going on in cyberspace, by learning more about the Internet and how to you a computer safely and effectively.

From a recent news article that I found on the Internet, “Beware of Disaster Scams,” on Scam-Busters.org, in which they are warning people about the Hurricane Katrina scams that have been sent out to fool people as a charity relief scam. There is also now, as of September 24th from the Search Engine Journal, there is a Hurricane Rita scam out there, Loren Baker reports. Baker highlights that the Washington Post told people that, “…spam and scam artists are registering Hurricane Rita oriented sites and domain names to prepare for e-mail and web based scam operations.” (http://www.searchenginejournal .com/index.php?p=2246) I found on the Internet about Internet fraud, called “Internet Fraud Watch Facts,” Holly Anderson tells us that, “more that 60 percent of Internet fraud victims pay by checks, cash, or money orders, and 19 percent pay by credit card. Other means of payment include telepone bills, bank account debits, and wire transfers.” (http://www.natlconsumersleague.org/ ifwfact2.htm)

From the Vancouver Post article by Gillian Shaw, “Phone spam a security risk”, Shaw talks about David Pais, Chief financial officer of an Eyeball Networks, in telling us, “Everybody gets spam even though they use anti-spam software…” As a result, this article states that scammers and fraud companies can tap into private telephones and get access personal account numbers. There is already the problem of pop-up porn ads, credit card ads, and investment ads that people been trying to avoid. Phone spam is also affecting security risk for Internet users, in which Gillian Shaw, The Vancouver Sun, says that, “SPIT, for Spam over Internet Telephony, is the latest worry security experts are warning about as the increasing adoption of VoIP1 phones creates a new avenue for porn peddlers and fraud artists to infiltrate homes and offices.” I think people should know this because the article states that VoIP (Voice over Internet Protocol) is the most used telecommunication out there.

I had to find out what VoIP was, so I typed it up in Google and I came to the Federal Communications Commission website. What I found was that VoIP was “Internet Voice, also known as Voice over Internet Protocol (VoIP), is a technology that allows you to make telephone calls using a broadband Internet connection instead of a regular (or analog) phone line. Some services using VoIP may only allow you to call other people using the same service, but others may allow you to call anyone who has a telephone number - including local, long distance, mobile, and international numbers. Also, while some services only work over your computer or a special VoIP phone, other services allow you to use a traditional phone through an adaptor. (http://www.fcc.gov/viop/) I never had a high speed Internet connection, but that doesn’t mean my computer is safe from getting hacked or tapped into.

We as Internet users need to know where the threat of Internet fraud is coming from. From “The Rising Tide of Internet Fraud,” Jonathan Rusch, Special Counsel for Fraud Prevention in the Fraud Section of the Criminal Division at the U.S. Department of Justice in Washington, D.C, mentions numerous types of Internet fraud like Equipment Software, Pyramids/Multi-Level Marketing (MLM), Business Opportunities Franchises, Work-at-Home Plans, Credit Card Issuing, and Prizes/Sweepstakes frauds. With each description of each kind of fraud, Rusch mentions federal accounts of fraud and criminal actions that lead criminal into pleading guilty. The most common Internet fraud out there that I found from the article is On-line auctions. In online auctions, criminals can take advantage of multiple e-mail addresses and false identities to place fake bids to raise the bid. Rusch also says that criminals also provide false background information and a false sense of security. If this happens, false providers can take your billing information, like your credit card number and use that against you by setting up new credit accounts for themselves. To read this article and get an insight of the other kinds of frauds, please visit to read the article for your self. If you want an insight and explanation of what an Investment fraud or pyramid fraud are in which Jonathan Rusch doesn’t clearly talk about, please go to to learn more.

Most of the information that I found in “The Rising Tide of Internet Fraud,” was provided by the International Fraud Complaint Center (IFCC) – a join project of the FBI and the National White Collar Crime Center. From the IC3 2004 Internet Fraud – Crime Report, prepared by the National White Collar Crime Center and the Federal Bureau of Investigation gives an insight of the total complaints received and referred by the IC3 yearly, providing information on fraudulent and non-fraudulent complaints primarily related to the Internet, showing statistics on percentage of the different types complaints reported, by type, monetary loss, gender, state, country, and age. To check out this important statistical informational report, please go to <> to see what the highest complaint referred by the IC3 was for 2004.

From the Internet article, “Internet Auction Fraud Among FTC’s Top 10 Consumer Complaints for 2004,” it said that Internet auction fraud was the highest in complaints according to the Federal Trade Commission’s annual report in 2004, as complaints grow from 83,161 to 98,653, between 2003 and 2004. Of the complaints reported in 2004, 246,570 were identity theft, and 388,603 were fraud complaints. Credit card fraud was the most common form of the reported identity theft. There are also various complaints and confessions from on-line buyers and sellers from eBay, that I read myself on Crimes-of-Persuasion.com. Hears one incident that I thought was very profound. “I was sold a stolen vehicle on eBay. I wired the money to the seller instead of using my credit card because the seller said he didn't want to make the transaction through his business. When I received the bill of sale on the vehicle, the bill of sale was from his business. I'm sure this was done because he didn't want a "charge back" made to his account through Visa, knowing that the vehicle was stolen. How do I go about filing wire fraud charges against the seller? The FBI doesn't seem to want to get involved because the sale was under $5,000. How do I go about prosecuting and getting my money back? This person owns two businesses in Alabama and doesn't feel he is responsible for returning my money. Please give me any links or other help that you can provide. EBay was helping me I thought, but now they won't respond to my e-mails. Thank You, John Lowry. 03/17/02.” If you want to read some of the complaints for yourself, please go to .

Becoming aware of Internet fraud in the interactive world of cyberspace is up to you. How you use your information on the internet, is up to you, but who you give it to, is very important. I think it’s important that you should have an idea on what’s going on out there in cyberspace. I want you as a computer Literate, to use the information that I provided you to the fullest extend. I found some helpful Internet websites that can help you to know more about Internet fraud. I recommend that you read “Foundations: Why Hackers Want You,” by William Van Winkle at , to get an insight of why hackers might want our computer information and to find out ways to stay safe in cyberspace. If you want to know how to protect yourself from spam, please go to Yahoo.com at . To find important information about preventing yourself from Internet auction fraud, credit card fraud, investment fraud, Nigerian Letter Scam/419 Scam, business fraud, identity theft, cyber stalking, go to the IC3 annul report at . I also recommend you to read “Staying Safe in Cyberspace,” by Lawrence R. Rogers, to learn how to keep your computer safe by knowing about E-mail security at . I hope the information that I provide you, will help secure you and your computer from any Internet scams, frauds, and scandals. If you want to talk to me about my personal thoughts and beliefs about the issue of Internet fraud, please contact me at: , and surely I will respond to you concern about issue you have with Internet fraud.

(Needs to be revised and rewritten)


Work Cited:
Anderson, Holly. “Internet Fraud Watch Facts.” National Consumers League. 10
February 1998. 26 Sept. 2005. http://www.natlconsumersleague.org/ifwfact2.htm

Baker, Loren. “Hurricane Rita Internet Scams.” Search Engine Journal. 24 Sept. 2005.
26 Sept. 2005. http://www.searchenginejournal.com/index.php?p=2246

Baron, Denis. “From Pencils to Pixels: The Stages of Literacy Technology.” (15 - 33)
Passions, Pedagogies, and 21st. Century Technologies. Gail Hawisher and
Cynthia Selfe, Editors. Logan, UT. Utah State University Press. 1999.

“Deceptive Billers Agree to Settle FTC Charges.” Federal Trade Commission.
31 January 2002. 20 Sept. 2005. http://ww.ftc.gov/opa/2002/01/atc.htm

Grant, Susan. “NCL Internet Fraud Testimony: Fraudulent Schemes on the Internet
Remarks to the Senate Permanent Committee on Investigations.” National
Consumers League. 10 February 1998. 9 Sept. 2005. http://www.nclnet.org/advocacy/fraud/testimony_fraud_schemes_02101998.htm


“Internet Auction Fraud and Western Union Payment for Undelivered Goods Scams.”
Crimes of Persuasion.com. 26 Sept. 2005. http://www.crimes-of-persuasion.com/Crimes/Delivered/internet_auctions.htm

“Investment Scams: Introduction.” Tutorials. 2005. Investopedia.com.
03 Oct. 2005. http://www.investopedia.com/university/scams/

Lanford, Jim, and Audri Lanford. “Protect Yourself from Internet Scams.”
ScamBusters.com. Wednesday, 14 Sept. 2005. 14 Sept. 2005
http://www.scambusters.org/

National White Collar Crime Center and the Federal Bureau of Investigation.
“IC3 2004 Internet Fraud – Crime Report.” 1 January 2004 - 31 December 2004.
National White Collar Crime Center. 2005. Information provided by the Internet Fraud Complaint Center. 20 Sept. 2005. http://www1.ifccfbi.gov/strategy/2004_IC3Report.pdf

“Protecting Yourself From Spam: Avoiding Spam.” Tutorials. 2005. Yahoo.com
14 Sept. 2005. http://help.yahoo.com/us/tutorials/mail/mail/otherspam1.html

Raymond, Eric Steven. “How to Become a Hacker.” Hacker History and Culture.
Revision 29 Jun 2005. Thyrsus Enterprises. 14 Sept. 2005. http://www.catb.org/~esr/faqs/hacker-howto.html

Rogers, Lawrence R. “Staying Safe in Cyberspace.” Global Issues. November 2003. The
Software Engineering Institute, Carnegie Mellon University. 14 Sept. 2005.
http://usinfo.state.gov/journals/itgic/1103/ijge/gj07.htm

Rusch, Jonathan. “The Rising Tide of Internet Fraud.” U.S. Attorney’s Bulletin. May
2001. Computer Crime and Intellectual Property Section (CCIPS) of the Criminal
Division of the U.S. Department of Justice. 14 Sept. 2005.
http://www.usdoj.gov/criminal/cybercrime/usamay2001_1.htm

Shaw, Gillian. “Phone spam a security risk: The cellphone industry is working to tackle
What could be a massive problem before it takes root?” The Vancouver Sun. 26 September. 2005. 26 Sept. 2005. http://www.canada.com/vancouver/vancouversun/news/business/story.html?id=3df3410c-4231-4253-a56b-43b33639b7f1

Steiner, Ina. “Internet Auction Fraud Among FTC’s Top 10 Consumer Complaints for
2004.” AuctionBytes.com. February 02, 2005. 26 Sept. 2005.
http://www.auctionbytes.com/cab/abn/y05/m02/i02/s03

Swartz, Jon, and Sandra Block. “Underground market for stolen IDs thrives.” Money:
USA TODAY.com. 2 March 2005. 14 Sept. 2005. http://www.usatoday.com/money/industries/technology/2005-03-02-datathieves-usat_x.htm.

Turkle, Sherry. “Identity Crisis.” Cyberreader. Ed. Victor Vitanza. Needham Hights: A
Viacom Company, 1999. 78 - 94.

Turkle, Sherry. “Life on the Screen: Identity in the Age of the Internet.” New
York: Simon & Schuster, 1995. 5 - 11.

Van Winkle, William. “Foundations: Why Hackers Want You.” LiveSecurity Service.
2005. WatchGuard Technologies, Inc. 19 Sept. 2005. http://www.watchguard.com/infocenter/editorial/1719.asp.

Woolley, Benjamin. “Cyberspace.” Cyberreader. Ed. Victor Vitanza. Needham Hights: A
Viacom Company. 1999, 7 - 19.