Archive for June, 2011

Bullies are taking advantage of technology to intimidate and harass their
victims. Dealing with cyberbullying can be difficult, but there are steps
you can take.

What is cyberbullying?

Cyberbullying refers to practice of using technology to harass, or bully,
someone else. Bullies used to be restricted to methods such as physical
intimidation, postal mail, or the telephone. Now, developments in electronic
media offer forums such as email, instant messaging, web pages, and digital
photos to add to the arsenal. Computers, cell phones, and PDAs are current
tools that are being used to conduct an old practice.

Forms of cyberbullying can range in severity from cruel or embarrassing
rumors to threats, harassment, or stalking. It can affect any age group;
however, teenagers and young adults are common victims, and cyberbullying is
a growing problem in schools.

Why has cyberbullying become such a problem?

The relative anonymity of the internet is appealing for bullies because it
enhances the intimidation and makes tracing the activity more difficult.
Some bullies also find it easier to be more vicious because there is no
personal contact. Unfortunately, the internet and email can also increase
the visibility of the activity. Information or pictures posted online or
forwarded  in mass emails can reach a larger audience faster than more
traditional methods, causing more damage to the victims. And because of the
amount of personal information available online, bullies may be able to
arbitrarily choose their victims.

Cyberbullying may also indicate a tendency toward more serious behavior.
While bullying has always been an unfortunate reality, most bullies grow out
of it. Cyberbullying has not existed long enough to have solid research, but
there is evidence that it may be an early warning for more violent behavior.

How can you protect yourself or your children?

* Teach  your  children  good  online  habits – Explain the risks of
technology, and teach children how to be responsible online (see Keeping
Children  Safe  Online for more information). Reduce their risk of
becoming cyberbullies by setting guidelines for and monitoring their use
of the internet and other electronic media (cell phones, PDAs, etc.).
* Keep lines of communication open – Regularly talk to your children about
their online activities so that they feel comfortable telling you if
they are being victimized.
* Watch  for  warning  signs – If you notice changes in your child’s
behavior,  try  to  identify  the  cause  as  soon as possible. If
cyberbullying is involved, acting early can limit the damage.
* Limit availability of personal information – Limiting the number of
people  who  have  access  to contact information or details about
interests, habits, or employment reduces exposure to bullies that you or
your child do not know. This may limit the risk of becoming a victim and
may  make it easier to identify the bully if you or your child are
victimized.
* Avoid escalating the situation – Responding with hostility is likely to
provoke  a  bully  and  escalate  the  situation. Depending on the
circumstances, consider ignoring the issue. Often, bullies thrive on the
reaction of their victims. Other options include subtle actions. For
example, you may be able to block the messages on social networking
sites or stop unwanted emails by changing the email address. If you
continue  to get messages at the new email address, you may have a
stronger case for legal action.
* Document the activity – Keep a record of any online activity (emails,
web pages, instant messages, etc.), including relevant dates and times.
In addition to archiving an electronic version, consider printing a
copy.
* Report cyberbullying to the appropriate authorities – If you or your
child  are being harassed or threatened, report the activity. Many
schools have instituted bullying programs, so school officials may have
established policies for dealing with activity that involves students.
If  necessary, contact your local law enforcement. Law enforcement
agencies have different policies, but your local police department or
FBI  branch  are  good  starting points. Unfortunately, there is a
distinction between free speech and punishable offenses, but the legal
implications should be decided by the law enforcement officials and the
prosecutors.

Additional information

The following organizations offer additional information about this topic:
* National Crime Prevention Council – http://www.ncpc.org/cyberbullying
* StopBullying.gov – http://www.stopbullying.gov/
_________________________________________________________________

Author: Mindi McDowell

US-CERT is aware of public reports of a phishing attack that specifically targets US government and military officials’ Gmail accounts. The attack arrives via an email sent from a spoofed address of an individual or agency known to the targeted user. The email contains a “view download” link that leads to a fake Gmail login page. The login information is then sent to an attacker. Google has indicated that this phishing campaign has been disrupted and that affected parties have been notified.

US-CERT encourages users and administrators to do the following to help mitigate the risks:
* Review the Google blog entry Ensuring your information is safe
online.
* Do not follow unsolicited web links or attachments in email
messages.
* Use caution when providing personal information online.
* Verify the legitimacy of the email by contacting the organization
directly through a trusted contact method.
* Refer to the Recognizing and Avoiding Email Scams (pdf) document
for more information on avoiding email scams.
* Refer to the Avoiding Social Engineering and Phishing Attacks
document for more information on social engineering attacks.
* Refer to the Using Caution with Email Attachments document for
more information on safely handling email attachments.