Possible IT, Computer & Tech. Connection to the Long Island Case, Perp & Victims

DNA Solves
DNA Solves
DNA Solves
@ Reannan

Your questions are not dumb! On the contrary, they are very helpful.

If you read through some of my earlier posts (mostly in thread 13), the reasons why I think the perp is a computer hacker/cracker might become clearer. I am also wondering if the perp did some cyber recon on the victims before actually calling them and meeting them. I am exploring the Possibility that the perp Might of hacked into the craigslists accounts of the victims as a starting point.

I apologize if these posts are confusing. I don't have a lot of time to post so I think that might contribute to the seemingly randomness of my posts. I will do better.
 
do you have a particular website in mind that you believe the SK owns/operates? or are you just discussing possibilities?

:computer:
Thanks to You for asking that MrsPC, I'm finding myself more and more wondering if the SK posts here, including Shanan's killer if he is not the SK.

Then I wonder which poster he is if he posts here or at LISK. Like to drive me batty :waiting: I want to see what his thoughts are, points he's trying to get across, etc.

Sometimes I have had a glimmer or two where I've thought Hmmmmm. Crazy, just :pullhair:
 
Thanks to You for asking that MrsPC, I'm finding myself more and more wondering if the SK posts here, including Shanan's killer if he is not the SK.

Then I wonder which poster he is if he posts here or at LISK. Like to drive me batty :waiting: I want to see what his thoughts are, points he's trying to get across, etc.

Sometimes I have had a glimmer or two where I've thought Hmmmmm. Crazy, just :pullhair:

I feel the same way!

Just know the perp Ain't me! MOO.
 
Wrt the LISK site. This ( link ) was posted before, but figured I'd post some excerpts, since people are speculating.

We thought LongIslandSerialKiller.com was a pretty brash and heartless project, so we reached out to its creator with a few questions. His answers are illuminating and not at all what we expected.
"To start off, I just want to say that this website began as a mockery of the daily onslaught of news coverage that this particular story has received," the proprietor explained to Runnin' Scared via email.

[...]

The creator identifies himself as "just a web designer" who watches the news while he works. "I kept hearing 'Long Island Serial Killer!' over and over and over. I think the coverage of this story is a bit Natural Born Killers-esque," he explained.

[...]

"I watch Law and Order and CSI, like every other American, so this is kind of just like another television show. The website is my interpretation of the way the media has presented this to the public."
 
Here are some links to my previous posts regarding the Possible IT, computer and Tech. connection to the Long Island case. Hopefully, it will shed light on my theories and provide a linear progression of the theories.

[ame="http://www.websleuths.com/forums/showpost.php?p=7450381&postcount=7"]Websleuths Crime Sleuthing Community - View Single Post - NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13[/ame]


[ame="http://www.websleuths.com/forums/showpost.php?p=7447917&postcount=36"]Websleuths Crime Sleuthing Community - View Single Post - 48 Hours Mystery - cbs- Saturday[/ame]


[ame="http://www.websleuths.com/forums/showpost.php?p=7447173&postcount=21"]Websleuths Crime Sleuthing Community - View Single Post - 48 Hours Mystery - cbs- Saturday[/ame]


[ame="http://www.websleuths.com/forums/showpost.php?p=7453360&postcount=17"]Websleuths Crime Sleuthing Community - View Single Post - NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13[/ame]


[ame="http://www.websleuths.com/forums/showpost.php?p=7453360&postcount=17"]Websleuths Crime Sleuthing Community - View Single Post - NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13[/ame]


[ame="http://www.websleuths.com/forums/showthread.php?p=7455184#post7455184"]NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13 - Page 2 - Websleuths Crime Sleuthing Community[/ame]


[ame="http://www.websleuths.com/forums/showpost.php?p=7456800&postcount=261"]Websleuths Crime Sleuthing Community - View Single Post - New Search for Shannan Gilbert, Body found in Marsh[/ame]


[ame="http://www.websleuths.com/forums/showthread.php?p=7458540#post7458540"]New Search for Shannan Gilbert, Body found in Marsh - Page 11 - Websleuths Crime Sleuthing Community[/ame]


[ame="http://www.websleuths.com/forums/showpost.php?p=7458852&postcount=277"]Websleuths Crime Sleuthing Community - View Single Post - New Search for Shannan Gilbert, Body found in Marsh[/ame]


[ame="http://www.websleuths.com/forums/showpost.php?p=7460393&postcount=291"]Websleuths Crime Sleuthing Community - View Single Post - New Search for Shannan Gilbert, Body found in Marsh[/ame]


[ame="http://www.websleuths.com/forums/showthread.php?p=7466234#post7466234"]NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13 - Page 3 - Websleuths Crime Sleuthing Community[/ame]


[ame="http://www.websleuths.com/forums/showthread.php?p=7467339#post7467339"]NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13 - Page 4 - Websleuths Crime Sleuthing Community[/ame]


[ame="http://www.websleuths.com/forums/showpost.php?p=7476172&postcount=138"]Websleuths Crime Sleuthing Community - View Single Post - NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13[/ame]


[ame="http://www.websleuths.com/forums/showpost.php?p=7476485&postcount=141"]Websleuths Crime Sleuthing Community - View Single Post - NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13[/ame]


[ame="http://www.websleuths.com/forums/showpost.php?p=7479409&postcount=147"]Websleuths Crime Sleuthing Community - View Single Post - NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13[/ame]


[ame="http://www.websleuths.com/forums/showthread.php?p=7483386#post7483386"]NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13 - Page 7 - Websleuths Crime Sleuthing Community[/ame]


http://www.websleuths.com/forums/showthread.php?t=157685&page=7

http://www.websleuths.com/forums/showthread.php?t=157685&page=12

http://www.websleuths.com/forums/showthread.php?t=157685&page=14

[ame="http://www.websleuths.com/forums/showpost.php?p=7514573&postcount=396"]Websleuths Crime Sleuthing Community - View Single Post - NY-LI 10 bodies found on Beach-Poss. SrlKlr-12/10-4 id'd; more found 3/11 #13[/ame]
 
So, what other purpose do these hypothetical sockpuppets, straw men, meat puppets and SNERTs serve besides what has been already mentioned in my posts about each of them? Well, working together and/or alone they can “game a website.”

Gaming a web site means doing various things to achieve your goals, often in a sneaky, underhanded, unethical manner that violates the rules or terms of service of websites such as online-gaming sites, blogs and forums that have multiple outside users contributing content to a website.

Often this consists of creating multiple user accounts for a site, and using those accounts to boost the popularity of a "main" account or persona. On a website where multiple outside users contribute content, the same technique can be used to buttress an idea and/or opinion and to give the impression that the idea/opinion has more supporters than it actually does. For example, one might create multiple accounts and have all those accounts up-vote or thumbs up a single account or that single or “main" accounts postings thereby artificially increasing the perceived value or reputation of that main account. This tactic is also used by cyberbullies to give the impression that a group of unrelated people are in opposition to another person or persons.

A person might create multiple accounts when they first establish a presence on a site and then start using them over the course of time. Alternatively, a person might simply create new accounts as needed to do the same thing. It is also possible for a person to hack/crack into a website's system to search for dormant accounts and take those over.

Some sites will have measures in place to prevent this behavior. Most commonly, this involves limiting a user to only having one account or profile per email address. This is easily defeated as there are many places you can get as many free email accounts as you want, such as Google, Hotmail, Yahoo etc.

More sophisticated sites try to prevent this behavior by limiting a user to one account per IP address. This is not always effective, as a lot of Internet service providers give their users "dynamic" IP addresses which means that the IP address might be different every day or every time you restart your cable or dsl modem.

It's also pretty easy to come to a site with a different IP address using proxy servers or other means of spoofing your IP address. You might log on to one account from your home computer, another from your smart phone, and another from a coffee shop or open wifi access point. This method is easy and simple and doesn't call for any tech know-how.

https://en.wikipedia.org/wiki/Gaming_the_system

Could the LI perp be "gaming a website" to misdirect LE and investigators, influence public opinion, feed his enormous ego, pacify his huge craving for attention, taunt LE, mock the victims' families and loved ones, lie, thumb his nose at authority, treat the rights and thought/feelings of others with contempt, gratify his need for control and/or launch a defense strategy?
 
So, what other purpose do these hypothetical sockpuppets, straw men, meat puppets and SNERTs serve besides what has been already mentioned in my posts about each of them? Well, working together and/or alone they can “game a website.”

Gaming a web site means doing various things to achieve your goals, often in a sneaky, underhanded, unethical manner that violates the rules or terms of service of websites such as online-gaming sites , blogs and forums that have multiple outside users contributing content to a website. The phrase “gaming a website” is most commonly associated with on-line gaming websites.

Often this consists of creating multiple user accounts for a site, and using those accounts to boost the popularity of a "main" account or persona. On a website where multiple outside users contribute content, the same technique can be used to buttress an idea and/or opinion and to give the impression that the idea/opinion has more supporters than it actually does. For example, one might create multiple accounts and have all those accounts up-vote or thumbs up a single account or that single or “main" accounts postings, thereby artificially increasing the perceived value or reputation of that main account. This tactic is also used by cyberbullies to give the impression that a group of unrelated people are in opposition to another person or persons.

A person might create multiple accounts when they first establish a presence on a site, and then start using them over the course of time. Alternatively, a person might simply create new accounts as needed to do the same thing. It is also possible for a person to hack/crack into a website's system to search for dormant accounts and take those over.

Some sites will have measures in place to prevent this behavior. Most commonly, this involves limiting a user to only having one account or profile per email address. This is easily defeated, as there are many places you can get as many free email accounts as you want, such as Google, Hotmail, Yahoo etc.

More sophisticated sites try to prevent this behavior by limiting a user to one account per IP address.
This is not always effective, as a lot of Internet service providers give their users "dynamic" IP addresses which means that the IP address might be different every day or every time you restart your cable or dsl modem.

It's also pretty easy to come to a site with a different IP address using proxy servers or other means of spoofing your IP address. You might log on to one account from your home computer, another from your smart phone, and another from a coffee shop or open wifi access point. This method is easy and simple and doesn't call for any tech know-how.

https://en.wikipedia.org/wiki/Gaming_the_system

Could the LI perp be "gaming a website" to misdirect LE, investigators, influence public opinion or launch a defense strategy?

Off the subject, but are you from Texas? I try to visit Austin a few times per year.

Okay, now back to the topic at hand...
 
Off the subject, but are you from Texas? I try to visit Austin a few times per year.

Okay, now back to the topic at hand...

How did you know?? Man, I can't put anything past the sleuthers here at WS.
 
Yeah, I'm pretty good. It's a gift really. You can't teach the type of sleuthing I do.


Clearly we are in the presence of greatness people!

You must really like Austin. Some of my relatives graduated from UT Austin...but...some other relatives graduated from that other place (people fr/ that school are often referred to as a word that rhymes with Saggie).
 
We don't need to discuss what purpose members have for being here or what position they take, IDs or whatever. Please just discuss the case and respect their right to their own opinions. If your post was removed, I'm talking to you.
 
In regard to articles and links (on this thread) as to "sock puppets, straw puppets, snerts etc" and the motivations behind such entities: With the focus being toward the general topic and how this case seems to have brought out such entities, it seems like a topic that we could examine further.


Please be advised: I never said that this was happening here at WS. All of the posts that discuss "sock puppets" etc. with the exception of the "gaming the website post" have this written at the end: This post does Not pertain to WS (I hope).

I should of added the "this post does not pertain to WS" at the end of post #29 but, I didn't. That was my mistake. My apologies.
 
These entities find their way onto almost every website, forum, blog, etc. The trick/challenge is to ignore them.
 
NCSL
National Conference of State Legislatures
State Cyberstalking, Cyberharassment and Cyberbullying Laws
Last Update: January 26, 2011
http://www.ncsl.org/issues-research...king-cyberharassment-and-cyberbullying-l.aspx

"Cyberstalking.Cyberstalking is the use of the Internet, email or other electronic communications to stalk, and generally refers to a pattern of threatening or malicious behaviors. Cyberstalking may be considered the most dangerous of the three types of Internet harassment, based on a posing credible threat of harm. Sanctions range from misdemeanors to felonies.

Cyberharassment. Cyberharassment differs from cyberstalking in that it is generally defined as not involving a credible threat. Cyberharassment usually pertains to threatening or harassing email messages, instant messages, or to blog entries or websites dedicated solely to tormenting an individual. Some states approach cyberharrassment by including language addressing electronic communications in general*harassment statutes, while others have created stand-alone cyberharassment statutes.

Cyberbullying. Cyberbullying and cyberharassment are sometimes used interchangeably, but for the purposes of this chart, cyberbullying is used for electronic harassment or bullying among minors within a school context. Recent cyberbullying legislation reflects a trend of makaing school districts the policy enforcers of such misconduct. As a result, statutes establish the infrastructure for schools to handle this issue by amending existing school anti-bullying policies to include cyberbullying or electronic harassment among school age children. The majority of these state laws establish sanctions for all forms of cyberbullying on school property, school busses and official school functions. However, some have also extended sanctions to include cyberbullying activities that originate off-campus, believing that activities off-campus can have a chilling and disruptive effect on children's learning environment. The sanctions for cyberbullying range from school/parent interventions to misdemeanors and felonies with detention, suspension, and expulsion in between. Some of these laws promote Internet safety education or curricula that covers cyberbullying."
 
theguardian
Cyberstalking: tackling the “faceless cowards”
Cyberstalking is a growing problem, but until now has not been
rescognised as a serious crime. Helen Pidd reports on the battle
against the hidden menace online
by Helen Pidd
Thursday 23 September 2010
http://www.guardian.co.uk/uk/2010/sep/24/ukcrime-police

“Being accused of paedophilia is damaging for anyone, but for Reed, a 42-year-old youth worker, it was catastrophic. He had already warned his boss that someone had started a smear campaign against him, calling him a child molester on various message boards, and then adopting multiple personas to pile on to these forums and give the impression that lots of people agreed. Luckily, Reed's boss believed him. But what about anyone else who was bored enough to enter his name into a search engine? "Any time a work colleague gives me a strange look, I think, has he found this stuff about me on the internet?" says Reed, who is still being targeted to this day.”


The Register
“Being cyber-stalked is as bad as being raped, or in a war”
Amazing claim from, erm, a new cyberstalk research centre
By Lewis Page
12 July 2011
http://www.theregister.co.uk/2011/07/12/cyberstalking_is_really_really_bad/

“The results indicate that the prevalence of PTSD following cyber-stalking exceeds the occurrence in a general population following trauma and is comparable to other extreme specific traumatic events such as sexual assault and combat ... the victims' reactions are of a negative nature and include fear, stress, anxiety, as well as an erosion of trust in the self and other people.”


BBC News
Cyber-stalking laws: police review urged
By Samantha Fenwick
30 April 2011
http://www.bbc.co.uk/news/13200185

“Professor Carsten Maple, who heads the National Centre for Cyber-stalking Research at Bedfordshire University, said it was easy for those in-the-know to track down information.
He said Trojan spyware can be used to hack into anybody's computer, access their personal files and even secretly switch on their webcam.

Trojans are viruses which pose as harmless programmes and can be sent into computers via e-mails and other methods.”


theguardian
Cyberstalking “now more common”
than face-to-face stalking
First study of its kind shows complete stranger target victims, of
whom nearly 40% are men
Karen McVeigh
Friday 8 April 2011
http://www.guardian.co.uk/uk/2011/apr/08/cyberstalking-study-victims-men

“Cyberstalking is now more common than physical harassment, according to new figures due to be released next week, with many victims finding themselves pursued by complete strangers online.”


Office of Justice Programs
National Institute of Justice
http://www.nij.gov/topics/crime/stalking/welcome.htm

“According to Tjaden and Thoennes (1998), 8.1 percent of women and 2.2 percent of men report having been stalked during their lifetime. One percent of the women sampled and .4 percent of men had been stalked during the 12 months prior to the study. Annually, approximately 1 million women and 370,000 men are stalked. Most victims (77 percent of women, 64 percent of men) reported that they knew their stalker. These figures exclude victims under the age of 18 and those who are homeless or do not have phones.

Stalking can be carried out in person or via electronic mechanisms (phone, fax, GPS, cameras, computer spyware, or the Internet). Cyberstalking—the use of technology to stalk victims—shares some characteristics with real-life stalking. It involves the pursuit, harassment, or contact of others in an unsolicited fashion initially via the Internet and e-mail. Cyberstalking can intensify in chat rooms where stalkers systematically flood their target's inbox with obscene, hateful, or threatening messages and images. A cyberstalker may further assume the identity of his or her victim by posting information (fictitious or not) and soliciting responses from the cybercommunity. Cyberstalkers may use information acquired online to further intimidate, harass, and threaten their victim via courier mail, phone calls, and physically appearing at a residence or work place.”



crime-research.org
Cmdr. Dave Pettinari
Pueblo County Sheriff's Office
http://www.crime-research.org/library/Cyberstalking.htm

“How serious is cyberstalking?

Cyberstalking shares important characteristics with offline stalking. Many stalkers - online or off - are motivated by a desire to control their victims. The majority of cyberstalkers are men and the majority of their victims are women, although there have been reported cases of women cyberstalking men and of same-sex cyberstalking.

Since cyberstalking does not involve physical contact, some misperceive this criminal attempt as something much tamer and less threatening than physical stalking. This is not necessarily true. As the Internet becomes entwined with our personal and professional lives, stalkers can take advantage of the ease of communications as well as increased access to personal information. Given the enormous amount of personal information available through the Internet, a cyberstalker can easily locate private information about a potential victim with a few mouse clicks or keystrokes.

Other things that pave the way for a cyberstalker are the often anonymous character of the Internet, and the practiced use of non-confrontational and impersonal communications. A potential stalker may be unwilling or unable to confront a victim in person or over the telephone, but he or she may have little hesitation about sending the victim harassing or threatening electronic communications.

Finally, just as in physical stalking, online harassment and threats may be a prelude to physical violence or serious property damage. In that sense, they must all be taken seriously on the first report by the victim.
Similarities and differences between online and offline stalking

Similarities

· While stranger stalking occurs in the real world and in cyberspace, the majority of cases involve stalking by former intimates.

· Most stalkers are men, most victims are women.

· Stalkers are generally motivated by the desire to control the victim.

Differences

· While offline stalking generally requires the perpetrator and the victim to be located in the same geographic area, cyberstalkers may be located across the street or across the country.

· Electronic communications technologies make it much easier for a cyberstalker to encourage third parties to harass or threaten a victim. For example:

· The cyberstalker might impersonate the victim and post inflammatory messages to bulletin boards or in chat rooms, causing viewers of that message to send threatening messages back to the victim who they believe sent them the offending messages.


· A stalker may post a controversial or enticing message on the board under the name, phone number, or e-mail address of the victim, resulting in subsequent responses being sent to the victim.

Each message -- whether from the actual cyberstalker or others -- will have the intended effect on the victim, but the cyberstalker's effort is minimal. With an electronic buffer between him and his victim, the cyberstalker feels more comfortable in engaging than he would physically confronting his victim. And the lack of direct contact between the cyberstalker and the victim can make it difficult for law enforcement to identify, locate, and arrest the offender.”
 
Daily KOS
A Daily Kos field guide to sockpuppets
SUN JUN 03, 2007
by MBNYC
http://www.dailykos.com/story/2007/06/03/342492/-A-Daily-Kos-field-guide-to-sockpuppets

“Identifying a Sock Puppet"

"Typically, the user has more knowledge than would be expected of a newcomer regarding the site's methods, rules, and community members; takes part in similar discussions and has mostly same opinions as the user's main account; and sometimes has an account name similar to those of other suspected sock puppets.”



*The article at this website discusses sockpuppets mainly in relation to the Daily KOS website. However, it offers a good look at how sockpuppets that were identified at their site generally function within an online community.


THE SITEJABBER
How to Catch a Sock Puppet
By Rich Johnson on Oct. 3, 2010
http://www.sitejabber.com/blog/2010/10/03/how-to-catch-a-sock-puppet/

*This website has a great chart on how to spot sockpuppets and their subspecies.



wikiHow
How to Recognize an Internet Sockpuppet
Edited by Maluniu and 6 others
http://www.wikihow.com/Recognize-an-Internet-Sockpuppet


wikiHow
How to Recognize a Troll on the Internet
Edited by KnowItSome and 28 others
http://www.wikihow.com/Recognize-a-Troll-on-the-Internet



**This Post Does Not Pertain to WS (I Hope)
 

Members online

Online statistics

Members online
93
Guests online
2,918
Total visitors
3,011

Forum statistics

Threads
603,449
Messages
18,156,794
Members
231,734
Latest member
Ava l
Back
Top