Showing posts with label Cyber Law. Show all posts
Showing posts with label Cyber Law. Show all posts

Sunday, September 27, 2009

Sue Scheff: Why people are buying Google Bomb Book



· Who should purchase Google Bomb?

Every person with a name and reputation which they wish to protect should purchase this book. You don’t have to be a technological titan to understand the examples provided. The take-away knowledge provides you a fighting chance to protect, and when necessary, reclaim your reputation. My adage re family online safety is: “Invest in your family’s online safety, commensurate with the value of your family.” This book’s modest price is asymmetrical to the increased value you’ll experience in your reputation safety quotient.

· Why you should purchase Google Bomb


Google Bomb is road-map clear, no missed exits, nor wrong turns, no questionable advice. It is an arrow in your quiver, so that you may defend yourself and/or prepare yourself should you have the unfortunate experience of receiving the vile ill-will of another via the social media environment in which we collectively exist – you do have a fighting chance.

· How Google Bomb touched me

Only infrequently does a book cause a reader to experience a personal visceral reaction; for me, it’s happened only once before. Google Bomb, the telling of Sue Scheff’s personal story in the recovery of her good name and reputation, is such a book, it moved me, and it will move you. Allow me to explain.

Those who know me well will have immediate understanding why a book which charts the Herculean efforts required to reclaim your good name, reputation and professional stature following the actions of a few to destroy, such resonated with me. You see, once you’ve traversed that road of false accusations, you never wish to replicate the journey again, and you’d wish it upon no one.

When it’s happening it’s surreal and unbelievable. Once the realization you aren’t dreaming hits home, you are either overwhelmed and capitulate, in effect self-declared road-kill or you take inventory of all your resources and deduce your good name and honorable reputation are the only remnants of your life worth protecting. You then take these remnants and use them to form the foundation of your reclamation efforts. Even if your first steps may feel a bit like Don Quixote tilting at windmills, persevere, what journey ever started off with every experience preordained?

I appreciated the description of the pivotal moment when Sue described the last straw, the straw which caused her to stand up and say, “Enough already.” I had complete visualization of her reaction when the miscreants who had been attacking her persona and her company, began attacking her children. I had no doubt her “mother bear” instinct to fight and protect her offspring was fully awake and it was game-on!

Unfortunately, bad things do happen to good people. You strive, perhaps seemingly altruistically to bring goodness to this world and awaken one day to find yourself surrounded by vile and unconscionable accusations. Your mindset describes the event as “stupefying,” you are now seemingly being punished for your good works. Google Bomb describes such an experience, Sue’s experience.

· What to do and how to do it

John Dozier’s insightful discussion of events, throughout the book, is clear and concise – the reader can easily understand the, “why” behind each of Sue’s actions. I found myself rereading and noting the legal and technical strategy employed as Sue’s reputation was reclaimed. I was nodding my head with great satisfaction as those wishing ill will upon Sue and her family were identified, held accountable and brought before the courts where they were ultimately held responsible and duly punished.

· Applicability for businesses and intellectual property

John’s extrapolation of his methodologies to the realm of a small, medium, or large company’s reputation and intellectual property protection is spot-on. My own book “Secrets Stolen, Fortunes Lost” was stolen within 60 days of publication from my publisher, and then shared via peer-to-peer networks (see my article Secrets Stolen, No Just the Intellectual Property which describes the experience). Plainly spoken, if you have intellectual property, “Have a strategy!” to protect it.

· Reputation Defense

Highlighting the good works of Michael Fertik’s Reputation Defender, was personally appreciated, as it reoriented my compass with respect to his firm – I’ll be re-engaging the company to learn more about their capabilities. My first encounter with Reputation Defender can only be described as “going sideways” and I have no doubt it was an anomalous event – I look forward to learning more from Michael or his staff, as Sue’s experiences described in Google Bomb, clearly show them to be effective.

· Google Bomb’s call to action

I agree with and wish to associate myself with the call-to-action contained in the book. We are all responsible for keeping our shared online community safe. When self-policing and self-control fail, then we do require meaningful laws availed to law enforcement and prosecutors. Laws having backbone and are easily understood and are flexible enough to anticipate evolution of technology are required. In essence our current situation is analogous to having a population center of millions without a “time-out” corner.

In my opinion, we need alignment of state and federal statutes which will hold accountable those engaging in cyber stalking, invasion of our privacy, personal impersonation and character defamation. In the United States, well meaning legislators are acting individually and from the optic of their constituent states – we need federal action. Furthermore, restraining orders need to have appropriate meat attached to their bones, with a need to integrate 21st century technologies – in the physical world 100 feet is measurable, in the virtual world, geographic borders are obscured – lets bring technological audit trails, access controlled environments and filtering into play.

It is no small task to fill the international voids which provide haven for both domestic and international criminal or malevolent individuals to operate with impunity, but instead of describing the difficulty, let’s get started. I’m all in! If we don’t all step up and contribute, then Sue’s story will be the first of many more to come.

· My personal thank you

In closing, I’d like Sue to know I’ve great personal empathy for the angst which she and her family experienced and I commend her for her display of personal courage and fortitude, from her decision to stand up and not take it any more, all the way through the sharing of her story so that others may learn from her experiences. For John, your work speaks for itself, nicely done sir.

Thank you Sue also for your good works both individually and through your Parents Universal Resource Experts (PURE); it is clear you are one of the good people, and many families no doubt are grateful beyond their ability to articulate for the assistance you provided. Thank you John for your clear explanations of the legal strategy and steps one can take to protect oneself, you’ve empowered many.

--
Christopher Burgess
Christopher is the senior security advisor within a Fortune 100 company. He is also the co-author of Secrets Stolen, Fortunes Lost, Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
http://www.secretsstolen.com/
Twitter: @burgessct
This reviewer paid for this book

Sunday, November 2, 2008

Sue Scheff Victorious Again - Free Speech does not condone Defamation

It has been almost 2 years since I won the unprecedented $11.3M jury verdict for damages that was done to me. In these past 2 years I have been contacted by many victims of Internet Defamation and Slander. You can feel literally powerless - however also know, that with my case, the truth is always your defense.

There have been many articles written about this new rage and growing concern not only with parents of teens online, but with business owners and regular people.

I didn't ask to become a limited public figure, and many people don't ask for this - with all the media attention I can be considered this since my initial victory in 2006.

I will continue being a voice against Internet Defamation - as well as working with my Senator and Congresswoman towards new legislation to help protect individuals and their careers.

Friday, August 15, 2008

The Internet: Has it Become a Weapon for some people?

Since winning my unprecedented lawsuit in September 2006 - with a jury verdict for damages done to my family, my organization and myself - over $11M - I am contacted on a daily basis from other victims of Internet Harassment, Abuse, Slander and Defamation.

This is a growing problem with today's expanding Cyberspace and more and more businesses being rated online. It has been stated that many time that many clients, when they seen negative posts on someone or a business, will usually not take the time to find out if it is Internet Gossip or fact.

I have heard from small business owners who have filed bankruptcy, struggling professionals that had one client or former employee take revenge with the keypad, as well as potential job applicants not getting a job after a firm did an Online Search. This is becoming a serious problem and needs to be addressed.

For those that believe that free speech will condone defamation, think twice - and read about my case. This is not about free speech - this is about people intentionally and maliciously destroying others with a few keystrokes in what is being called E-Venge.

I continue to answer as many emails as I can hoping to give others the support in the fact they are not alone.

Monday, June 9, 2008

Sue Scheff: Internet Defamation Carries a Big Price Tag


Since winning my unprecedented case against Internet Defamation, many people contact me looking for lawyers that specialize in Internet Law.


David Pollack, Miami, FL - was my attorney that won the $11.3M jury verdict for damages. Visit his website at http://www.davidpollacklaw.com/


John W. Dozier, Washington D.C. and offices in NY and CA- specializes in Internet Law and more. Visit his comprehensive website at http://www.cybertriallawyer.com/Internet Law is a growing area - and more and more lawyers are learning more about this.


Thanks to the new Cyberbullying laws, this can help more plaintiffs take a strong stand against being harassed online without infringing on their first amendment.



Tuesday, May 27, 2008

Sue Scheff - Proving Free Speech will not support Internet Defamation and Slander

Read through this Blog and you will see that free speech is still in place but it will not condone defamation.

Blogging is fun, the Internet can be educational - but remember, what you post today can come back to haunt you tomorrow. And could be costly to you!

Sunday, April 27, 2008

Sue Scheff: Revenge is a dish best served ... online

Vengeance websites are giving angry women the chance to expose their ex-partners as love rats. David Smith on the rising tide of ‘e-venge’

Click here for entire article.

As a victim of E-Venge (Sue Scheff) I know firsthand how deadly a few keystrokes can be to a person, a business and in life. I fought back - and won an uprecedented jury verdict for damages of over $11M for malicious and defamatory online comments.

Free speech will not condone defamation - this is not about the first amendment. I will continue to be a voice in promoting Internet Safety without infringing on free speech. My meetings with my Senator and my Congresswoman are the beginning of a long journey towards positive change.

Thursday, April 17, 2008

Sue Scheff on The Rachael Ray Show - Hot Topic of CyberSlander


Sue Scheff continues to be a voice against CyberSlander. As both a victim and survivor of Internet Defamation, she has become a leader in promoting Cyber Safety.


On April 17th Sue Scheff appeared on the Rachael Ray Show talking about Cyber Slander and promoting her upcoming new book - Wit’s End!


Free Speech will never condone defamation. In an unprecedented jury verdict for damages, Scheff was awarded over $11Mfor the malicious and defamatory online comments from a woman that wanted E-Venge.


For more articles on E-Venge - check out http://www.suescheffpodcasts.com/. Sue Scheff retained the priceless services of Reputation Defender. If you are a victim of Internet Abuse, take a moment to review the services Reputation Defender has to offer.


If you are a parent, it is important to consider Reputation Defender MyChild to help protect your child online.

Tuesday, April 1, 2008

Internet Defamation, Slander, CyberBullying - Sue Scheff a Voice for Online Safety

Check out my new website on Podcasts about E-Venge.

Today's Cyber World has created new concerns for many people, especially parents and their kids using the Social Networking sites such as MySpace.

It is important to read how to protect your kids online and also be aware of where they are surfing.

I often recommend to parents to consider Reputation Defender/MyChild to help them monitor their children's name and where and how it is being used online.

Thursday, March 20, 2008

Sue Scheff: Five Ways to Defend Yourself Online

True or false, the information people find about you on the Web can have a big impact on your life. Here are five techniques to make sure that what people read about you is good (or at least true).

Click Here for full article.

Defending yourself online has became a serious concern for many people. The lack of regulations in Cyberspace means you have to learn to maintain your own Google Image.As both a victim and survivor of Internet Defamation, I know first hand the toll this can take on a person and their family. I fought back and won an unprecedented jury verdict for damages of $11.3M.

Free Speech does not condone defamation!

Saturday, March 15, 2008

Sue Scheff - A Voice Against Internet Defamation and Internet Slander

After I won an unprecedented jury verdict for damages done to me online of $11.3M - this has brought me into a new chapter of my advocacy. As a parent advocate, I educate parents on a loosely regulated industry some call - teen help residential programs and schools. After a horrific experience with my own teenager, I become a voice to create awareness to others so they didn't make the same mistakes I did.

Now with this new chapter of Internet Abuse and Cybersafety - I have meet with my Florida Senator several times and we just meet with our Congresswoman. I am very confident positive changes will be made to create a safer cyberspace - help to make people accountable - and reduce cyberbullying through new legislation.

My new position has put me in a public light, and I plan on using it to help others. I am contacted on a regular basis from victims of the Internet harassment as well as many media outlets. This is now a topic that is not going away anytime soon.

Visit my Podcasts on E-Venge. My official website is http://www.suescheff.com/

Wednesday, March 5, 2008

Sue Scheff Podcasts on Internet Slander and Defamation

Check out my new Podcasts on Internet Defamation, Internet Gossip, Internet Slander and Cyberbullying. This is becoming a major concern among people and parents today.

I will continue to be a voice against Cyber Crimes and Internet Harassment.

This week I meet with my Congresswoman and my Florida Senator and feel confident positive changes are in the future. I will continue working with them and continue to be a voice to help parents and others.

Sunday, February 17, 2008

Sue Scheff featured on CBC Sunday News Magazine


CBC News Television - Sunday Morning News Magazine

How can you fight back when your personal information - whether true or false - ends up on the Internet for everyone to see, like a potential employer, for example? We give you tips on protecting your reputation online.

Saturday, February 2, 2008

Maintaining Your Online Reputation


As both a victim and now a survivor of Online Attacks, Internet Defamation, Cyberstalkers from extremely disturbed people (in my opinion) I have fought back and won! In an unprecedented jury verdict for damages, I was awarded $11.3M for what one woman did to me online. The jury took time to read the hundreds of posts of clear defamation and slander in an attempt to destroy me, my organization and hurt my family.


In many interviews I have been asked ”why” do people find the need to hurt others? I simply don’t have that answer. We can speculate, but I believe deep down people are not happy with themselves and feel the need to project their misery on to others.


John Dozier of Dozier Internet Law wrote an excellent article the outlines potential persona’s of these type of people. “The Top Ten Blogger Persona’s: The Mobosphere Unvieled.” Then Jacqui Cheng wrote about the Nutjobs that feel the need to hurt others online. It is obvious this is a growing problem.



Take the time to protect your online reputation - if you need to reach out for help, Reputation Defender is one of the services today that has helped protect many people and takes extra steps to protect our children with MyChild.

Wednesday, January 23, 2008

Memo to Internet Nutjobs: Please think before you post




Threats against others on the Internet are just about as surprising as the sky being blue every morning. But some threats are more serious than others, and the list of victims seems to be expanding as more of the unwashed masses general public gets online. Online marketers are one of the newest groups to join that list, and once again, we are faced with questions about how much regulation is necessary in online communities to keep the peace without stepping on users' freedom of expression.


Related Stories



Marty Weintraub, a search engine optimization expert at aimClear, detailed on SearchEngineWatch.com some of his recent experiences with death threats online. He, like many other online marketers, had begun focusing marketing efforts on social sites like Facebook and StumbleUpon because of their rich user data and easily-targetable user groups. But not all users are fond of the fact that their personal data can be used for marketing purposes, and Weintraub found himself right at the center of angry StumbleUpon users' crosshairs after posting about how much he loved the eBay-owned site.


"The feeling was reminiscent of historic book burnings because of violent and Nazi-laced symbolism and hyperbolic rhetoric," Weintraub wrote. The level of harassment even increased after he discussed his experiences publicly several times. After receiving a number of death threats and calls for suicide by members of StumbleUpon (of which Weintraub notes are a violation of the site's Terms of Service), he turned to the FBI, who told him that nothing could be done about users from overseas and that he should contact moderators of the site. Eventually, StumbleUpon moderators reacted by booting a single user from the site. "Then all hell broke loose," Weintraub wrote.


StumbleUpon, however, did not tell us whether it would take any further action against the harassers. Instead, we got a fairly generic statement about the TOS. "We take the concerns of our members seriously," StumbleUpon VP of marketing Dave Feller told Ars. "When users register on our site, they agree to our Terms of Use which state that they cannot post 'threatening, libelous, defamatory, obscene or otherwise objectionable' content. StumbleUpon does not condone behavior that violates out Terms and will take action when these situations occur."


To most of us who have spent a large part of our lives participating in forums, the above situation doesn't sound all that bad. But is that because we're been conditioned to accept a much lower set of standards for online behavior? At what point do threats online become more serious than juvenile postings?


A number of incidents have been publicized in recent years as a result of cyber harassment. An man sued AOL over a chat room kerfuffle that allegedly resulted in one member attempting to intercept his (real) mail. High school teachers and principals have faced online allegations of child molestation. A third of teens say that they've experienced some sort of cyberbullying. Two law school students sued AutoAdmit after receiving repeated death, rape, and other threats, which resulted in one victim losing a number of job prospects. And now there's a (somewhat stale) movement towards a Blogger Code of Conduct after programmer and instructor Kathy Sierra was subject to a string of threats of physical harm, death, and rape online.


It's hard for me to write about this. Having been a writer for Ars Technica for a number of years now and a forum member for more than twice as long, I'm no stranger to trolls. I remember the first time I received an e-mail containing a photo of a woman being gang-raped with my face Photoshopped over hers. Then there was the time when a certain forum and IRC member started following me around online, eventually gained access to my unlisted phone number, and began calling me repeatedly all hours of the night to tell me what "pleasant" things he planned to do to me. Another time, a reader showed up at my door unannounced. The last time I wrote about Ron Paul spam, I received hordes of e-mail and IM messages from "supporters" telling me to watch out when I leave the house lest someone put a hit on me for "selling out." Some of my colleagues are so afraid for me that one of them offered to teach me self-defense for the sole purpose of protecting myself against readers who have gone off their rockers.


So, I can sympathize with Weintraub.


He doesn't ask for much—all he wants is for eBay (and the companies that own similar communities online) to step up moderation of users that go over the line. "[T]he only pathway to success and longevity in social media is to actually participate and bring value to the community," he wrote. "If the problem continues then many people will leave. eBay might be left holding a $75 million investment with limited value to big brands."


Unfortunately, the solution isn't quite that simple—anyone who has moderated any sort of community knows that doing so means constantly walking a thin, gray, moving line, and users are equally as sensitive to over-moderation as they are to a constantly negative environment. But he does have a point—no one should have to put up with that kind of constant harassment, online or off. Not even marketers.



What message do we have for those who choose to harass others online? First, none of us are perfect (that includes the Ars staff, Weintraub, Kathy Sierra, you, me, and the rest of the Internet). Second, realize that your words aren't going into a black hole. They're being read by other people—a lot of them, in some cases. You may hate these people and what they have to say, but addressing issues instead of taking cheap pot shots or making death threats against people will go a long way towards ensuring that your point of view is heard, and maybe even respected. That's better than having the substance of your arguments disappear in a torrent of threats and invective.

Tuesday, January 15, 2008

Top Ten Blogger Personas: The Mobosphere Unveiled by John Dozier, Dozier Law


Top Ten Blogger Personas: The Mobosphere Unveiled
By John Dozier - Dozier Internet Law

Ever since Congress passed Section 230 of the Communications Decency Act giving immunity to interactive service providers for publishing the defamation of others, a wide range of characters has arisen and infiltrated the mainstream blogosphere. Instead of becoming a source for obtaining reliable information, the blogosphere, and user generated content, is at risk of becoming a less credible information source. Dozier Internet Law is constantly battling these “black hat” forces and over the past several years we have acquired quite an insight into this underworld; an anonymous and covert society bent on terrorizing businesses. These are our internal thoughts on the matter, and not scientific analyses. We are not psychiatrists; just trial lawyers trained for almost fifty years to figure out the human nature of clients, witnesses, and juries.

All too often blog attacks are simply protection rackets and extortion schemes in disguise. We have been working on documenting the organizational structure and operational methodologies used by these racketeers. For now, let’s take a look at the entire panoply of characters we seem to run into. For those businesses under attack, it is essential that you first identify the publisher’s persona and motivation before beginning to identify the proper strategies for addressing his often seemingly legitimate posts. We don’t go into details on how we work with clients to deal with each type of personality, but the tools vary considerably from being passive, to utilizing SEO services, to implementing reputation management initiatives, to pre-litigation and lawsuit actions.

Pickpocket

This is the guy who used to wait on street corners for elderly ladies to pass. He enjoys attacking defenseless people and stealing covertly using deception. This type of blogger will steal your copyright protected content, have the search engines push your prospective clients to his site, and then run ads and otherwise direct the traffic to your competitors. He could be an affiliate marketer for a competitor getting a share of the revenue, or he could simply be running Google or Yahoo ads on his site. Pickpockets also take great pleasure in stealing your trademarks…surreptitiously using your mark in hidden tags, meta tags, hidden redirect pages, or through a myriad of search engine optimization techniques, all in the hopes of re-directing your prospects to a competitor and taking money from you.

Wacko
We usually identify a wacko situation quickly. There are distinctive characteristics of his communications. The wacko is usually a “follower”, someone looking to gain attention and recognition, but escalates what may have started as fair criticism into more and more outrageous claims. Most sophisticated business people immediately view the poster as a “nut case”, particularly when an excessive amount of time or energy disproportionate to the merits of the subject is expended. But it is not easy for the typical browser on the web to see the pattern, usually spread over multiple web properties.

Druggie

Or, maybe “liquid courage” would be more appropriate. This guy is exactly what comes to mind. During the day this blogger is a normal guy, but at night he returns to the sanctity of his home, gets drunk or high, and goes out on the web looking for “hook-ups” and blogging on his “hang-ups”. This guy is hard to detect as a fraudster, and sometimes won’t recall what he said online the next day while under the influence. He posts aggressive, false and arbitrary attacks on whatever issue of the day (or night) catches his fancy.

Alien

No, not from another world. But from overseas. In a far, far away place, without any treaty with the US, in a country without an effective legal system and no notion of business or personal property ownership rights. Many of these types operate out of certain Russian provinces, but the blogs, postings and communications appear to be from the customer down the street. This individual usually has an ulterior motive, often working with the criminal discussed below. He has no fear, until he takes a vacation to Turkey and US federal agents grab him for extradition, which is exactly what happened on a case in the not so recent past.

Nerd

This is the guy who is scared to talk with a girl, but behind the keyboard, all alone, morphs into a Casanova. This empowerment of anonymity creates an omnipotent persona, and for the first time the nerd feels the effect of power and control, gets an adrenaline buzz when he exercises it, and he exercises it often, usually creating or perpetuating a volatile situation in which he feels he can outsmart the “opposition”. There is no principle involved. His blog postings are all about the adrenaline. It is hard to know if you are dealing with this type online…his posts are intelligent and on their face credible. But, once you identify the nerd blogger, he cowers and goes away, usually forever.

Rookie

Enjoy debating a thirteen year old? They are out on the net acting like adults, posting statements and play-acting like a grown-up. The challenge, of course, is that most people reading the posts have no idea these are coming from a kid. The tip off can be the utter immaturity of the posts, but most often the kids can sound credible criticizing, for instance, a CPA's method of calculating RIO on REIT holdings, because they can mimic earlier posts. There is no insidious motive here; just kids having fun as the hormones kick in. But the readers of the blog posting don’t know that.

Sadist

This person attacks others, causes pain, and revels in the results in ways not worthy of mention. He loves to create, direct, control, and unleash a firestorm of criticism about a company just to create pain and damage. This type of person may often by the prime instigator of the online attacks, and tightens the noose by escalating the attack rapidly, almost as if in an obsessive state. You will find a sadist going to many sites and blogging, and he usually lets you know it was him because he uses his real moniker. He has characteristics of a stalker, and he is most likely to be the one that starts recommending direct physical violence against the executives of a company. This person is not motivated by money, but by the pure enjoyment of pain being visited upon innocent parties.

Bankrupt

No, not morally bankrupt. Actually bankrupt…no money, no assets, no prospects for work, and nothing to lose. These bloggers post without fear of the consequences or any regard for the truth because you “can’t get blood out of a turnip”, you “can’t get water from a rock”, and all these other sayings handed down, we surmise, through his generations. This is usually not a smart guy, but his postings are damaging and inflammatory. Many will own and control blogs without any concern about the consequences of liabilities that might arise through the perpetuation and “enhancement” of posts, and sometimes will post to their own blog and act like it was from a third party.

Criminal

Career criminals, no less. Like the convicted felon running a sophisticated extortion scheme against a very prominent business. Or the owner of an open blog avoiding service of process with guard dogs protecting his compound. The thieves and crooks of the world are online today; and the criminals often have both an organization and a highly effective and surprisingly coordinated operational plan in place to target a business. Rumors of $500,000 a year payoffs seem to promote this problem, which emanates from more of a “mobosphere” than the blogosphere.

Mis-Leader

This person is in no manner a leader. This blogger has a hidden agenda, but he just makes it sound like he is a totally objective commentator. He can create an appearance of authority and the casual visitor to his blog does not question the legitimacy. This type of persona is hard to figure out. One of the most pervasive practices is to control a blog and allow negative posts against all except his generous advertisers. Another common technique involves omission; not disclosing conflicts of interest or the existence of a business or personal relationship because the readers of the blog would totally discount the commentator’s posts as unreliable and biased.

In closing, most of the blogosphere is legitimate, offers honest opinions and comments that add value to an open dialogue, and is an excellent example of the exercise of constitutionally protected free speech. The “mobosphere”, on the other hand, operates outside of the spotlight and often uses reckless, irresponsible, false and defamatory statements for personal or professional gain, all too often focused on self gratification and pecuniary benefits. As businesses attempt to leverage user generated content (“UGC”) into a valuable tool in the Web 2.0 environment, the proliferation of the scofflaws interrupting the free flow of credible speech in the online world puts at risk the reputation and integrity of UGC and raises the very real risk that consumers will begin viewing web content with disdain and suspicion.
**************************************************
After speaking with John Dozier, I feel he is definitely someone that is in tune with today's concerns in Cyberspace. When he showed me this article he wrote - I knew I had to Blog it myself.
As a victim and survivor of Internet Defamation - and my dealings with Cyberbullies - this article helps define some of the people that believe that free speech condones defamation.