tag:blogger.com,1999:blog-84582213535545247542024-03-06T01:14:25.991-08:00Michael Roberts of Rexxfield Licensed Private InvestigatorOnline defamation is a low tech form of harassment that destroys business, career and family.Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.comBlogger16125tag:blogger.com,1999:blog-8458221353554524754.post-69175323718452134422019-01-07T09:14:00.000-08:002019-02-04T21:42:26.761-08:00Investigator Michael Roberts of Rexxfield Catches Murder Fugitive for US Marshalls<h2 style="background-color: white; box-sizing: border-box; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 15px; line-height: 26px; margin-bottom: 26px;">
Case Study: Rexxfield's Michael Roberts Sets Digital Traps to Catch Murder Fugitive from 8998 miles away.</h2>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCz7FXEw3M8YUTOczdwrr1-7JLxiifvqxRtLuLiGng1Bv1gVZHOHOSiDubjjtVsi4XCmpenQjcnNyG0g_T6khX__3wTuWbCQzC4tBBicuClpWs6TyCBkU0CE_agHH-rrS0c-LHqvtjvVWT/s1600/fugitive-Dinkue-Brown-arrested1.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="242" data-original-width="155" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCz7FXEw3M8YUTOczdwrr1-7JLxiifvqxRtLuLiGng1Bv1gVZHOHOSiDubjjtVsi4XCmpenQjcnNyG0g_T6khX__3wTuWbCQzC4tBBicuClpWs6TyCBkU0CE_agHH-rrS0c-LHqvtjvVWT/s200/fugitive-Dinkue-Brown-arrested1.png" width="127" /></a></div>
<div style="background-color: white; box-sizing: border-box; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 15px; line-height: 26px; margin-bottom: 26px;">
While Rexxfield CEO Michael Roberts was visiting Australia, he was asked to join a US-Based, multi-agency, national manhunt for <a href="http://www.authorizedstatement.org/people/michael-roberts/MURDERER-ARRESTED-Rexxfield-CEO-Michael-Roberts-Investigator-Catches-Murder-Fugitive-US-Marshals.php" rel="nofollow" style="background-color: transparent; box-sizing: border-box; color: #4db2ec; text-decoration-line: none;" target="_blank">murder fugitive Dinkue Brown</a>, who had been evading police in connection with the murder of Luis R. Rodriguez, 26, who was murdered on June 21, 2013. The suspect had been on the run for 2 months prior to Michael joining the investigation.</div>
<div style="background-color: white; box-sizing: border-box; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 15px; line-height: 26px; margin-bottom: 26px;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUHeUR5z9BfnWjzxFXtpZ_D7pjodCSaArAzlepewtAYqpzEQcNSQRbD4PXLgqCASlsqL_urrQMp_7-J3gqWDmspOL-dJh6wcHnrYOtNE83H_WHUwPUtefAzC2p4Bn7Ju3MIgRuT7J-HiLl/s1600/NexusMyst_Logo-SQ_.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1388" data-original-width="1384" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUHeUR5z9BfnWjzxFXtpZ_D7pjodCSaArAzlepewtAYqpzEQcNSQRbD4PXLgqCASlsqL_urrQMp_7-J3gqWDmspOL-dJh6wcHnrYOtNE83H_WHUwPUtefAzC2p4Bn7Ju3MIgRuT7J-HiLl/s200/NexusMyst_Logo-SQ_.png" width="199" /></a>From his temporary office in Brisbane Australia, Michael was able to trick the fugitive the fugitive into revealing his exact location in Indiana. This took only 73 minutes using Rexxfield’s proprietary digital tripwire system. This subsequently led to the fugitive's arrest by US Marshals. </div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwzvw9eqNndtQhdQbdh1upDsnPdoD0E-tBCxUEHT4HUw3zNvevAMUVCaWQts4onbIEcg7B2O8OPiTlPrOqa5zT9CgWH0qEN8qvDJ0rsYQrfhH9s4I2ZRYEIE2iNgJhhQQrvyrJHSUdD5wa/s1600/Rexxfield+Logo+Dark.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="208" data-original-width="513" height="80" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwzvw9eqNndtQhdQbdh1upDsnPdoD0E-tBCxUEHT4HUw3zNvevAMUVCaWQts4onbIEcg7B2O8OPiTlPrOqa5zT9CgWH0qEN8qvDJ0rsYQrfhH9s4I2ZRYEIE2iNgJhhQQrvyrJHSUdD5wa/s200/Rexxfield+Logo+Dark.png" width="200" /></a></div>
<div style="background-color: white; box-sizing: border-box; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 15px; line-height: 26px; margin-bottom: 26px;">
Roberts said that <i>“Brown had been using sophisticated internet proxy servers to obfuscate his location and communications with family and friends. Rexxfield’s system was able to circumvent Brown’s safeguards, which included disposable single-use cell phone SIM cards”</i>. Brown was located in Indiana and subsequently arrested along with two individuals individuals who were harboring him.</div>
<div style="background-color: white; box-sizing: border-box; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 15px; line-height: 26px; margin-bottom: 26px;">
Mr. Roberts stated that his team <i>“has a long history of offering <a href="http://www.rexxfield.com/law-enforcement-services.php" rel="nofollow" style="background-color: transparent; box-sizing: border-box; color: #4db2ec; text-decoration-line: none;" target="_blank">pro-bono investigative support for law enforcement</a> globally, particularly for unsolved violent crimes in which modern communication mediums can hold the clues to solving the cases”</i>.</div>
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="clear: right; float: right; margin-bottom: 1em; text-align: right;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimt7ZdcrlGTv2TzuYaoffrAzeg4ISesSUX2RnIyY5Ahr2AVOz-RlS52rFB7LYgFyy8-0TIzz-62RZBRIUWLgsEf3DJWaqS3P0dnQPuisAf-0jkwRqQIoHH_a5Lrc2cLhSgUSr_M2v5qkKb/s1600/Michael-Roberts-Rexxfield-InvestigationsJPG.JPG" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" data-original-height="378" data-original-width="378" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimt7ZdcrlGTv2TzuYaoffrAzeg4ISesSUX2RnIyY5Ahr2AVOz-RlS52rFB7LYgFyy8-0TIzz-62RZBRIUWLgsEf3DJWaqS3P0dnQPuisAf-0jkwRqQIoHH_a5Lrc2cLhSgUSr_M2v5qkKb/s320/Michael-Roberts-Rexxfield-InvestigationsJPG.JPG" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Michael Roberts Rexxfield's Founder licences his e-crime fighting tools to<br />
law enforcement and prosecutors globally.</td></tr>
</tbody></table>
<div style="background-color: white; box-sizing: border-box; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 15px; line-height: 26px; margin-bottom: 26px;">
Michael also secured the release of a father who had been incarcerated for twelve-days, without bail for allegedly sending electronic death threats. As part of a sting operation initiated by Michael at the request of the inmate's mother, Michael was able to prove that the death threats were in fact transmitted by the alleged victim, to herself, in order to frame the jailed man.</div>
<div style="background-color: white; box-sizing: border-box; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 15px; line-height: 26px; margin-bottom: 26px;">
Rexxfield spokeswoman, Jasmin Chan, said <i style="background-color: transparent;">“His record time for identifying a perpetrator was 17-minutes, it was a case where an Attorney General in the USA had already spent $ 100,000 of tax-payer’s money, with a grand jury and five attorneys, in futile attempts to identify a rogue Tweeter”. </i><span style="background-color: transparent;">She also said that </span><i>“victims helped by Roberts include school children, celebrities, CEOs and even Heads of State”</i>.</div>
<div style="background-color: white; box-sizing: border-box; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 15px; line-height: 26px; margin-bottom: 26px;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0Maryland, USA39.0457549 -76.641271235.878577899999996 -81.8048452 42.2129319 -71.477697200000009tag:blogger.com,1999:blog-8458221353554524754.post-65586509965547815982014-09-04T06:33:00.002-07:002014-09-04T06:33:24.575-07:00Our new project "Page1.me" Has been successful removing ripoff report from page 1 of Google in 91% of the cases so far!<br />
<div class="separator" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: center;">
<a href="http://page1.me/" target="_blank"><img alt="http://page1.me" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMb69roexjOUdgemzwG5zA63SS4gY67GkrU5U2va09_Qen35wsV2oe7EJnuhpL6cNsboeMeMnLKluOCfgxeOFujvIdMbeRijkacNBj7UDV4RXs9V3d2EDD66NGAaZ5FfeigLfooKWQ5F-W/s1600/page1.me-logo.png" title="page1.me" /></a></div>
<br />
If you're struggling with RipOffReport.com, or any other defamatory content, that is appearing on page 1 of Google search results for your personal name or business name. You might want to try a new project <a href="http://page1.me/">Page1.me</a><br />
<br />
Below is a screenshot of actual client cases from August 2014, the graph speak for themselves, each graph represents a negative search results on its downward slide from page 1 of Google.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://page1.me/" target="_blank"><img alt="http://page1.me" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgceFCfcTTX7kF4XWZqCmXSfuBn-sdQqPY5V_xlSErmAwcOn3HY_vm8y17b-UK3kO7KKCABn39TkZIagPJnhji9R4CPgpq7K2yLbJFHGHsNQO6CYeNikyf2qYAR5BK-kYFtMKB3dAjZ2dG5/s1600/20140829-Page1.me-Actual-Client-Case-Results.png" height="640" width="627" /></a></div>
<br />Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-19061842162991375062013-08-16T05:34:00.001-07:002013-08-16T05:36:42.158-07:00<h2>
Internet Bounty Hunter Takes Skip Tracing Deadbeat Dads & Deadbeat Moms to a New Level</h2>
<h3>
Rexxfield Cyber Investigation Services are now available to licensed private investigators & attorneys who are trying to locate deadbeat parents that refuse visitation, or paying child support.
</h3>
<div class="mediaBox">
<div class="ninormal clearfix" style="text-align: center; width: 100%;">
<img alt="Rexxfield CEO Michael Roberts" class="newsImage" height="250" src="http://ww1.prweb.com/prfiles/2012/12/02/11034163/gI_104345_Rexxfield-CEO-Michael-Roberts.jpg" width="250" />
</div>
<div style="clear: both; color: #999999; overflow: hidden; text-align: center;">
Rexxfield CEO Michael Roberts</div>
<div class="releaseQuote">
<img height="25" hspace="5" src="http://www.prweb.com/images/release-topquote.gif" width="29" /><i>We
have found that law enforcement and private investigation agencies are
often frustrated by sophisticated attempts by their targets to obfuscate
their location.<img align="absmiddle" height="25" hspace="5" src="http://www.prweb.com/images/release-bottomquote.gif" width="29" /></i>
</div>
</div>
<div class="releaseDateline">
New York, NY (PRWEB) August 16, 2013 </div>
<div class="releaseDateline">
<br /></div>
Traditional <a href="http://www.rexxfield.com/blog/2013/08/electronic-skip-tracing-services-locate-deadbeat-dads-and-deadbeat-moms-who-refuse-to-pay-child-support-or-refuse-visitation-to-the-other-parent/" rel="nofollow" title="Cyber investigation services, skip tracing, parental abduction, locating deadbeat dads and deadbeat moms">'Skip Tracing' services are provided by Private investigators</a>
around the world. This is where they attempt to physically locate
deadbeat parents who are avoiding paying child support or refusing
visitation to the other parent. Often these attempts to locate the
elusive parents are frustrated by sophisticated attempts by the parents
to live anonymously.<br />
<br />
The advent of modern communications, including the Internet and
mobile phones, provide new methods of locating these individuals.
Effective immediately, old-fashioned private investigators that do not
possess digital forensics skills have a new weapon in their skip tracing
arsenal.<br />
<br />
<a href="https://www.facebook.com/Rexxfield.FreeSpeechV3" rel="nofollow" title="Rexxfield Michael Roberts">Rexxfield.com's founder Michael Roberts</a>,
is a licensed private investigator specializing in electronic
surveillance, forensics and geolocation. Mr. Roberts announced today
that Rexxfield is opening up its "box of toys" and making their services
available to licensed private investigators globally. He said, "until
recently some of these services were reserved exclusively for government
or law enforcement agencies".<br />
<br />
<a href="http://www.rexxfield.com/blog/2013/08/electronic-skip-tracing-services-locate-deadbeat-dads-and-deadbeat-moms-who-refuse-to-pay-child-support-or-refuse-visitation-to-the-other-parent/" target="_blank">Read the full article here >>></a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-19052543169291928262010-10-23T17:33:00.001-07:002013-10-28T03:04:00.445-07:00Carla Franklin Wins: Google Must Reveal Identity Of Online Harasser<a href="http://i.huffpost.com/gen/211495/thumbs/s-CARLA-FRANKLIN-large.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" src="http://i.huffpost.com/gen/211495/thumbs/s-CARLA-FRANKLIN-large.jpg" style="cursor: pointer;" /></a><br />
The rumors of Internet anonymity have been greatly exaggerated! It never ceases to amaze me how often fools repeat their folly in thinking that they can't say what they want, when they want, about anybody, anywhere, and not have to stand behind the diatribe that they utter. If anyone is interested in a similar case to Carla's, and update was posted at the following link quite some time ago. This case has subsequently been successfully resolved, although the anguish that are caused the victim may take much longer to subside.<br />
<br />
<br />
<br />
<a href="http://tinyurl.com/2e73a4s" rel="nofollow" target="_blank">http://tin<wbr></wbr>yurl.com/2<wbr></wbr>e73a4s</a><br />
<br />
<br />
<br />
It has been delightful helping Carla over this last years despite the tumultuous circumstances. Although we specifically purposed to avoid a media circus, the silver lining on the cloud of this unwanted attention will hopefully be some common sense reform in the wild-wild-Web and the accompanying free-for-all smear campaigns.<br />
<br />
<br />
<br />
Keep on fighting the good fight Carla! There are thousands more victims going through the same trials and your inevitable victory in this matter will encourage others to follow in your footsteps.<br />
<br />
<br />
<br />
Thanks for contributing to the new cyber-harassment advocacy group, and for choosing it as a platform to keep those who are interested up to date: <a href="http://www.freespeechv3.org/" rel="nofollow" target="_blank">www.freesp<wbr></wbr>eechv3.org</a><br />
<br />
<br />
<br />
Respectfully submitted by Michael of FreeSpeechV3<br />
<a href="http://www.huffingtonpost.com/2010/10/21/carla-franklin-lawsuit-go_n_771063.html">Read the Article at HuffingtonPost</a><br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-54519508984370770932009-12-06T15:27:00.001-08:002013-10-28T03:04:24.968-07:00Ron Livingston: 'Office Space' Star Battles 'Malicious' Gay Rumors Online<a href="http://images.huffingtonpost.com/gen/123992/thumbs/s-RON-LIVINGSTON-large.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" src="http://images.huffingtonpost.com/gen/123992/thumbs/s-RON-LIVINGSTON-large.jpg" style="cursor: pointer;" /></a><br />
In many cases horrible problems have been avoided for the community as a result of anonymous blogging. This includes whistle blowing for white-collar criminals, community awareness when sexual predators move into the neighborhood, and many other alerts that are of great community benefit.<br />
<br />
<br />
<br />
Benefits notwithstanding, you can't make an omelette without breaking eggs and anonymous free speech on the Internet is one such omelette. There is no such thing as free speech; there is always a cost. Sometimes that cost is acceptable, moreover desirable, particularly in the case of positive community awareness. However, often their many false and deceptive rumors, and libelous attacks are motivated only by hatred and vindictive antisocial promptings. More often than not, these serial cyber defamers have some type of antisocial personality disorder. They have nothing better to do than hurt other people; in fact they are actually fueled by other people's pain. Normal people like 97% of the readers of my comment cannot begin to relate to how these people think. Stop for a moment and imagine not having a conscience..... it is simply impossible.<br />
<br />
<br />
<br />
A concerted, focused and malicious Internet smear campaign can be as devastating for a person that relies on his or her reputation for employment as a fire can be for a farmer who loses his fields, barns, and livestock.<br />
<br />
<br />
<br />
Respectfully submitted by Michael Roberts. <br />
<br />
Internet Libel Victim's Advocate.<br />
<br />
<a href="http://www.rexxfield.com/" rel="nofollow" target="_blank">www.Rexxfield.com</a><br />
<a href="http://www.huffingtonpost.com/2009/12/05/ron-livingston-wikipedia_n_381345.html">Read the Article at HuffingtonPost</a>
<br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com1tag:blogger.com,1999:blog-8458221353554524754.post-14249579085014006302009-07-18T21:01:00.000-07:002013-10-28T03:04:33.311-07:00In a perfect world free speech would work, but so would communism.....There is no such thing as free speech unless someone is discussing the weather. Good things are free yes, but good things are invariably abused. Free speech is abused, and this results in a cost to someone, namely the libel victim. Congressional immunity for republishing libel online (particularly with foreknowledge) is absurd. Newspapers, magazines, TV stations and radio can't, and their exposure is only momentary... why can online content providers when their content is immediately and perpetually available?. Adherents and practitioners of this silly safe-harbor are either lazy, ambivalent, anti-social or haven't yet experience the anguish of being on the receiving end.<br />
<br />
In a perfect world free speech would work, but so would communism.....<br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-55008501020198747472009-03-12T21:29:00.000-07:002013-10-28T03:05:22.988-07:00How to Identify Anonymous Bloggers<a href="http://www.rexxfield.com/abuseofintenetfreespeech.php">The US First Amendment</a> makes it very clear that anonymous criticism and civil dissent is a privileged (protected) form of free speech. Notwithstanding, it is not absolute; if an anonymous author publishes statements of fact that are deceptive by error (without malice) or maliciously deceptive, the veil of anonymity can be pierced and rightly so.<br />
<br />
The suggestion of cart blanche and absolute protection of all anonymous speech under the guise of "net neutrality", justified, malicious or otherwise is absurd. It is reasonably presumed that proponents of such notions have never experienced the financial and emotional debilitation of these vicious assaults. The recent advent of <a href="http://www.rexxfield.com/howtoidentify-anonymous-bloggers.php">anonymous online character defamation</a> mediums compound the victims' carnage exponentially due to the enduring nature of the postings, instant availability through search engines, and the viral republication thereof.<br />
<br />
I have posted some more information about <a href="http://www.rexxfield.com/howtoidentify-anonymous-bloggers.php">How to Identify Anonymous Bloggers</a><br />
<div>
<br /></div>
<div>
<a href="http://www.ehow.com/how_4835747_anonymous-bloggers-defame-seek-damages.html">How to Identify Anonymous Bloggers who Defame You (and seek damages)</a></div>
<div>
<br />
<div>
<br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a></div>
</div>
Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-17290148723406295392009-03-12T21:26:00.000-07:002017-03-18T22:00:49.668-07:00Online Character Defamation - RUTHLESS, SNEAKY & DEVASTATING.This growing risk of unchecked <a href="http://www.ehow.com/how_4836471_internet-defamation-remove-online-libel.html">online defamation</a> should be taken seriously by any person or organization with aspirations to a long and productive existence or career. The efficiency of today’s search engines combined with federal government immunity for re-publishers of libel is a devastating dilemma for those caught in the web.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://rexxfieldcharitiesdotorg.files.wordpress.com/2016/03/rexxfield-logo-dark.png?w=300" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="81" src="https://rexxfieldcharitiesdotorg.files.wordpress.com/2016/03/rexxfield-logo-dark.png?w=300" width="200" /></a></div>
<b>PLUG:</b> <a href="http://www.rexxfield.com/results.php">Rexxfield Online Slander & Libel</a> guardians offer economical and common-sense solutions to mitigate these risks in the short and long term. If the quagmire of litigation is unavoidable we can <a href="http://www.rexxfield.com/libel_law_suit.php">help your attorneys achieve results</a> faster and more economically than they can alone. However, we can usually achieve results outside the court; often without your antagonist noticing.<br />
<br />
<a href="https://pbs.twimg.com/profile_images/512158780306386945/vPox16ly_400x400.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://pbs.twimg.com/profile_images/512158780306386945/vPox16ly_400x400.jpeg" width="200" /></a><b>Second Plug:</b><br />I have also launched a "Search Suppression Service called <a href="http://page1.me/mr/">Page1.me</a>. Please visit the site. If you can justify our professional services, the profits go towards anti-defamation research and activism.<br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com2tag:blogger.com,1999:blog-8458221353554524754.post-54181430961391759382009-02-06T21:37:00.001-08:002013-10-28T03:05:39.958-07:00I thought I broke the InternetToday I was testing some new Mac Beta software. All of a sudden my browser went blank... I panicked, I thought I had just broken the internet. The only thing I could think to do was to reboot.<br />
<br />
The good news is, the problem was just local and restricted to my computer only. Don't worry, the internet is fine, I doubt anyone noticed but me.<br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-19392918088428972152008-10-28T09:59:00.000-07:002013-10-28T03:05:46.578-07:00The Seven Deadly Sins of Online Reputation Management<ol style="font-family: arial;">
<li>Do not wait until it happens to you.</li>
<li>Mitigate (reduce) the risk immediately (this is a different way of saying the same thing as (1) above, but it I need to push this point home).</li>
<li>A passive response is often better than aggressive particularly where your antagonist is a narcissist or sociopath (i.e. don't fight back directly) <span class="Apple-style-span" style="font-style: italic;">"A gentle answer turns away wrath, but harsh words stir up anger"</span> <span class="Apple-style-span" style="font-size: x-small;">Proverbs 15:1</span></li>
<li>Don't click on offending pages through Google, yahoo! etc, this may make them rank a little higher.</li>
<li>Do not post a rebuttal on the offending website, by updating the content you will inadvertently cause Google to think the page is worthy of higher ranking due to regular updates.</li>
<li>People are fickle; if you do post a rebuttal (on a different website), don't be too defensive; ; <span style="font-style: italic;">"The lady doth protest too much, methinks."</span><span style="font-size: 78%;"> [Hamlet's Queen Gertrude]</span></li>
<li>Be humble with republishes if you ask them to remove the libelous content. In the USA you can't sue them <span style="font-size: 78%;">(you can, but you won't win)</span>, and they don't have to remove it; even if you prove it is libel.</li>
<li><span style="font-size: 100%;">Change you name to John or Jane doe</span><span style="font-size: 100%;"> [Just kidding]. But seriously, if you have a unique name, the risk of online libel about you appearing on the first page of Google is much higher.</span><span style="font-size: 78%;"></span></li>
</ol>
<span style="font-family: arial; font-size: 78%;"><span style="font-size: 100%;">Ooops! That's 8 deadly sins. Consider on a bonus :)</span></span><br />
<br />
<span style="font-family: arial; font-size: 78%;"><span style="color: #cc0000; font-size: 85%;">The Fine Print:</span><br />This website and or any correspondence sent personally or generally from Rexxfield or any of its representatives to any reader should not to be construed as legal or medical or therapeutic advice unless otherwise expressly indicated in writing. This website was not authored by or sponsored by an attorney, medical practitioner or therapist and is provided for informational purposes only and is not intended to express or constitute legal, medical or therapeutic advice to any reader. No attorney-client relationship between the reader and any attorney is created by the web site, and no reader should act or refrain from acting on the basis of any content in the web site except in reliance upon the advice of a qualified attorney licensed to practice in the reader’s jurisdiction or other applicable professional practitioner such as for discussions on medical or therapeutic topics. The author is not an attorney or a firm of attorneys and is not licensed to practice law in any jurisdiction.</span><br />
<span style="font-family: arial; font-size: 78%;"><br /></span><br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-75185876043843222182008-09-30T06:48:00.000-07:002013-10-28T03:06:01.398-07:00English or "Globeish?" - The World Language<span style="font-family: arial; font-size: 130%;">Lost in Translation? Business is lost due to poor English Skills.</span><br />
<span style="font-family: arial;"><br />Europe has many thousands of entrepreneurial enterprises with innovative ideas ready for globalization. Language should not be a barrier to the world-wide distribution of these innovations.. Notwithstanding, many of these wonderful ideas do not make it past the starting line because their potential is lost in translation due to poor English expression throughout web sites and other collateral materials.<br /><br />Because English is so widely spoken, it has often been referred to as the "world language"; the lingua franca of the modern era. While English is not an official language in most countries, it is currently the language most often taught as a second language around the world. Some linguists believe that it is no longer the exclusive cultural sign of "native English speakers", but is rather a language that is absorbing aspects of cultures worldwide as it continues to grow. It is, by international treaty, the official language for aerial and maritime communications. English is an official language of the United Nations and many other international organizations.<br /></span><br />
<div>
<span style="font-family: arial;">English is the language most often studied as a foreign language in the European Union. (89% of schoolchildren).<br /><br />Among non-English speaking countries, a large percentage of the population claims to be able to converse in English.<br /><br />[<a href="http://en.wikipedia.org/wiki/English_language">References</a>]</span></div><br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-42382545835864979262008-08-18T21:28:00.000-07:002013-10-28T03:05:53.152-07:00SPIN - How the sociopath can get away with ... well everything.<div style="font-family: arial;">
Your understanding of a sociopath’s expert employment of “SPIN” is singularly the best way to begin to understand the way I and many others have found ourselves so frequently gasping in the wake of carnage left by my antagonist. When executing her anti-social agendas, her modus operandi was to sprinkle enough truth in any given lie to add credence to her deceptions. Alternatively, sometimes she will “kitchen sink it”. That is where she will overdose the performance with too much information; the end result is very muddy waters in which no reasonable person can navigate. </div>
<div style="font-family: arial;">
The clinical definition of this tactic is “SPIN”:</div>
<ol style="font-family: arial;">
<li><span style="font-weight: bold;">The most common referents for spin are:</span><br /><ol type="a"><br />
<li>a way of giving a positive cast to a negative story <span style="font-weight: bold;">or;</span></li>
<li>a way of giving a negative cast to a positive story (whichever is most advantageous to the spinner) <span style="font-weight: bold;">or;</span></li>
<li>a form of deception which tries to redirect the way (or whether) one thinks about an issue.</li>
</ol>
</li>
<br />
<li><span style="font-weight: bold;">Spin at its best:</span><br /><ol type="a"><br />
<li>looks like it is addressing an issue directly but is not.</li>
<li>cannot be factually disproved.</li>
<li>uses language that allows “interpretation” so that the spinner can deny lying; an example might be Bill Clinton’s definition of a sexual relationship, although it differed from that of most objective bystanders, it allowed him to redirect the way observers perceived the Lewinski scandal; but in a way that he could not be directly accused of lying.</li>
</ol>
</li>
</ol>
<br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-12633170787493472202008-08-11T23:51:00.000-07:002013-10-28T03:06:10.453-07:00Justifying IT Security Training & the ROI<span style="font-family: arial;">This essay is based on observations over a 12 year period in which I have been involved in the IT Training industry; most recently with Mile2 which delivers what is arguably the best Penetration Testing Training globally.</span><br />
<br />
<span style="font-family: arial;">Unlike “commodity” training such as commonly available Cisco and Microsoft certification courses, IT security training investments require a higher degree of due diligence on the part of the student and on the part of management personnel responsible for Information Assurance within their organization.</span><br />
<br />
<span style="font-family: arial;">Unfortunately the managers of many organizations have yet to grasp the severity of risks posed by the vulnerabilities invariably present within their network because many are yet to be identified. As such, they are often reluctant to invest in the security training those on the frontline are desperately seeking. This is akin to a bank being slow in deciding if it should have an armed guard in the foyer just because it has not had a hold-up since it opened in 1919, even though the crime indicators for the area escalating. If a decision was made to hire a guard and the bank enjoyed another 5-year period without a holdup, the “bean-counters” might argue that the guard is not needed. The question is how many holdups were thwarted by the guard? In the same manner, how many network breaches are thwarted by a network secured by personnel with relevant, efficient and up-to-date IT Security Training? It is not a measurable statistic, but the assumption that many breaches were probably thwarted does stand to reason.</span><br />
<br />
<span style="font-family: arial;">Unlike almost any other IT problem an organization may face, a security breach is far more serious than a broken router or a crashed hard drive which can be routinely remedied. After all, information assets such as customer databases, trade secrets and intellectual property are probably the most valuable assets on a commercial organization’s balance sheet; or, in the case of government or military entities, their databases contain some of the world’s most sensitive secrets. Information assets are usually the worst things to lose because when they are stolen, they are probably not insured and invariably create irrecoverable or irreversible damage.</span><br />
<br />
<span style="font-family: arial;">What I am attempting to articulate here is something fundamentally obvious, but which no one seems to have adequately addressed. What is the difference between a “specialty IT security trainer” and a “great general instructor with a mediocre to great book”? An executive director of a large Asian delivery partner asked this question recently and it is a great question. It occurred to us that the difference isn't in the quality of instruction, or in the curricula, or in the courseware, or in the frequency of updates. It is in the just-right combination of all these elements.</span><br />
<br />
<span style="font-family: arial;">A premier IT security training vendor does not sell training programs, or instructor days, or courseware; he sells an organization's security. Program graduates secure their organizations because they know what to do, when to do it and how, and they understand why. Good IA training vendors deliver on this promise time and again because they don't train just anybody (they insist on prerequisites), they don't rely on books and their instruction is a mix of from-the-field experience and pedagogical excellence.</span><br />
<br />
<span style="font-family: arial;">In an effort to provide the best possible protection for their clients’ information assets, </span><a href="http://www.mile2.com/IT_Security_Training.html" style="font-family: arial;">Mile2 Security Training Partners</a><span style="font-family: arial;"> have elected to bring in “hired guns” from </span><a href="http://www.mile2.com/" style="font-family: arial;">Mile2</a><span style="font-family: arial;"> to make sure students have everything reasonably required to create and implement effective security policies.</span><br />
<br />
<span style="font-family: arial;">Good Training Companies will continue to utilize their internal team of multifaceted instructors to provide great training value for “commodity” training courses such as Microsoft, Cisco and Citrix to name but a few. However, with respect to IT Security Training, they bring in the experts. This decision allows local students a quality alternative to the “class in a box” security options offered by other training vendors and delivered by all-purpose trainers. These courses are generally obsolete by the time the courseware or book is shipped, let alone presented in class. IT Security evolves constantly and in keeping, related curriculum should be printed only a week or two before each event to allow for crucial last minute updates; hence, covering the latest threats.</span><br />
<br />
<span style="font-family: arial;">You may be the decision maker for training budgets or you may have to go “hat in hand” to management for funding; either way, before you make a decision on what training to pursue, do a quick mental check list of EVERYTHING your organization can least afford to lose. Once you have the list, estimate the losses if that information is lost or stolen. If it is a customer database, how much would you lose if your customers lost their trust in your organization and went elsewhere with their business? This “scenario planning” is a great way to justify the training budget you need.</span><br />
<br />
<span style="font-family: arial;">When management compares the cost of potential losses against the relatively low training fees, they will find an excellent return on investment. Quality information security training programmes equate to a very low insurance premium for your priceless information assets.</span><br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-38312519445685054002008-08-09T00:42:00.000-07:002013-10-28T03:06:14.582-07:00Define:Sociopath - What is a Psychopath?<div>
<span style="font-family: arial; font-size: 130%;">THE SMEAR CAMPAIGN -- TRADEMARK OF A SOCIOPATH (A.K.A. Psychopath)</span><br />
<br />
<span style="font-family: arial;">If you are under libelous attack by a person who has deceived and defrauded you, there is a possibility that the person is a sociopath. Sociopaths have no heart, no conscience and no remorse. They will lie, cheat and steal from you, and then tell everyone that it is all your fault.</span><br />
<br />
<span style="font-family: arial;">Why is it so critical for you to know about sociopaths? Because millions of sociopaths, also called psychopaths, are living among us. Yes, many of them are criminals, locked up in jail. But far more are on the street, hurting people without breaking laws, operating in the gray areas between legal and illegal, or simply eluding the authorities. They can appear to be normal, but they pose a tremendous threat to us all. </span><br />
<br />
<span style="font-family: arial;">So how many are there? Depending which expert estimates you use, psychopaths and sociopaths comprise 1 percent to 4 percent of the world's population. And many people think these estimates are low.</span><br />
<br />
<span style="font-family: arial;">To learn more about sociopaths, Rexxfield recommends that you visit </span><a href="http://www.lovefraud.com/" style="font-family: arial;">Lovefraud.com</a><span style="font-family: arial;">. This web site is dedicated to informing the public about sociopaths, particularly with respect to personal and romantic relationships, so you can protect yourself. You might also want to read this article in the Lovefraud Blog, </span><a href="http://www.lovefraud.com/blog/2007/01/07/sociopaths-and-their-smear-campaigns/" style="font-family: arial;">Sociopaths and their smear campaigns</a><span style="font-family: arial;">.</span></div><br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com0tag:blogger.com,1999:blog-8458221353554524754.post-18686194499756635852008-08-09T00:24:00.000-07:002013-10-28T03:06:37.843-07:00Delete Internet Libel & Search Engine Reputation<span style="font-family: arial; font-size: 180%;">Essay - Internet Libel & Search Engine Reputation.</span><br />
<span style="font-family: arial; font-size: 130%;">The very low-tech end to business and career.</span><br />
<span style="font-size: 78%;">by Michael Roberts of Rexxfield</span><br />
<br />
<span style="font-family: arial; font-weight: bold;">Reputation:</span><span style="font-family: arial;"> is what others say about you.</span><br />
<br />
<span style="font-family: arial; font-weight: bold;">Character:</span><span style="font-family: arial;"> is what you really are as evidenced by your actions when no one is observing.</span><br />
<br />
<span style="font-family: arial;">IMPORTANT DISCLAIMER: Do not proceed without reading the linked disclaimer </span><a href="http://www.rexxfield.com/essay_internet_defamation_libel.html#Disclaimer" style="font-family: arial;">Click here to read.</a><br />
<br />
<span style="font-family: arial;">IT security is a multibillion dollar industry which has necessitated new and constantly revised laws in almost every state on earth. These laws address the criminal aspects of aggressive and deliberate business or personal privacy invasion and information disruption or destruction via various technology mediums; commonly referred to as “hacking”, or more accurately “cracking”.</span><br />
<br />
<span style="font-family: arial;">So what is the “low- tech" threat that goes largely unnoticed by the community, usually ignored by criminal prosecutors and yet the cause of billions of dollars in irreparable damage to business goodwill, personal reputation, and very significantly to the emotional well being of the human victims? The threat is called <span style="font-style: italic; font-weight: bold;">LIBEL</span>; a form of the ancient legal theory of <span style="font-style: italic; font-weight: bold;">SLANDER</span> with origins in Roman jurisprudence.</span><br />
<br />
<span style="font-family: arial;">This issue is close to my heart because I have had a very frustrating and bitter experience therein. I have purposed to collaborate with Rexxfield experts from various fields including psychology, medicine, technology, legal and public relations to produce resources to assist victims in their efforts to remedy the wrongs and for potential victims to mitigate the risks.</span><br />
<br />
<span style="font-family: arial;">Defamation is the term used internationally to generally describe an injury to reputation. Slander and Libel are false or malicious claims that may harm someone's reputation. Slander and libel both require publication with the fundamental distinction between the two lying solely in the form in which the defamatory material is published. If published in some fleeting form, such as spoken words or sounds, sign language, gestures and the like, then this would be slander. If it is published in more durable form, such as in written words, film, data disc (CD or DVD), blogging, web sites and the like, then it is considered libel. The key to these definitions is that the statements must be false. If someone published the truth about a person, it is NOT slander or libel. Slander and libel are not protected forms of free speech under the US First amendment. <a href="http://en.wikipedia.org/wiki/First_amendment#Libel.2C_slander.2C_and_private_action">[Reference]</a></span><br />
<br />
<span style="font-family: arial;">In law, defamation is the communication of a statement that makes a false or deceptive claim, expressively stated or implied to be factual, that may harm the reputation of an individual, business, product, group, government or nation. Most jurisdictions allow legal actions, civil and/or criminal, to deter various kinds of defamation and retaliate against groundless criticism. Related to defamation is public disclosure of private facts where one person reveals information which is not of public concern and the release of which would offend a reasonable person. Unlike libel or slander, truth is not a defense for invasion of privacy. <a href="http://en.wikipedia.org/wiki/Defamation">[Reference]</a></span><br />
<span style="font-family: arial;"><br /><span style="font-size: 130%;">The Security Enigma</span></span><br />
<br />
<span style="font-family: arial;">The cost of acquiring and implementing IT security systems to protect the information assets of organizations is relatively large. Gone are the days when a VAR could hype a new appliance or software solution that promises the world but delivers only headaches. Instead common sense is applied with careful assessment of the return on investment ("ROI") for risk mitigation, disaster recovery and business continuity planning. After all, in most small businesses or enterprises the most valuable assets of the balance sheet is not insured against loss, damage or theft; those assets are the data, customer lists, secrets, plans and the organization’s or the individual’s reputation.</span><br />
<br />
<span style="font-family: arial;">Despite the prudent and extensive developments to mitigate the risks associated with unauthorized breaches in network security and other business disasters, very little has been done to assess the cost or to stimulate moves toward equitable judicial reforms to combat low technology cyber stalkers, antagonists, liars, extortionists and emotional terrorists. One well placed blog entry or web site with a strategically placed keyword combination can destroy an individual’s career, or many years of reputation and goodwill building for a business. For this unethical and cowardly minority a blog can become the cyber equivalent of an IED (improvised explosive device) for his or her victim’s career in the case of an individual; or the livelihood of anywhere from a few people to thousands of families who depend on the continued good standing of their employer in the community. Unlike data, reputations cannot be backed up nor easily restored.</span><br />
<br />
<span style="font-family: arial;">Although there is legislation for criminal prosecution of defamation offenders in some jurisdictions (17 US states), it is almost unheard of. This leaves only civil court action which is expensive, drawn out and emotionally draining. The remedies available through tort are hindered and largely neutered by the lie mongers’ ability to engage in guerrilla tactics and wield their poison keyboards with apparent impunity by hiding behind anonymous user names, guest passes and I.P cloaking solutions. The explosive increase in public hot spots in restaurants, airports and other anonymous internet connections makes anonymity easier by the day.</span><br />
<br />
<span style="font-family: arial;">Additionally, the third party dissemination and republication of libel can turn the reputation problems into a wildfire. This can be particularly damaging if the victim has a unique name or trademark and a low appearance density in search engines. We all have a naïve and gullible friend or family member who insists on forwarding silly email rumors without checking the authenticity at snopes.com or other urban legend sites. It takes only a few of these <span style="font-style: italic;">“It was on the internet; it must be true!”</span> people who have been enabled by simple blogging technologies to result in search results monopolized by lies; the devastating effect of which does not require rocket science to assess.</span><br />
<br />
<span style="font-family: arial;">I have had extensive personal experiences with an antagonist who has relentlessly attacked me physically, emotionally, financially and publicly. The internet has been the most damaging venue to me as an entrepreneur; in early 2008 I had an agreement in principal with a European angel investment team to fund a start-up venture that I could not grow organically. Within 24 hours of the agreement they found my antagonist’s $1 a month “GoDaddy” web site and withdrew their offer immediately. In early April 2008, a $70 million enterprise was enthusiastically engaged in dialogue with me for a partnering venture in the USA… until they found <span style="font-style: italic;">“that web site”</span> and withdrew.</span><br />
<br />
<span style="font-family: arial;">Naturally, the more absurd the libelous assertions in a web page the less likely an objective observer will be to believe it. However, once that bystander becomes a potential employer or strategic partner in business the scenario changes drastically. The decision they make about associating with the libel victim will be filtered by the question <span style="font-style: italic;">“what will my customers think?”</span>. If they have customers who believe everything they read on the internet, or who forward chain emails without checking for authenticity, then I am afraid you will likely become the proverbial leper. If your antagonists are clever, they will cast flaming aspersions against you that are altogether deceptive, but sprinkled with enough truth that, although benign in its own right, makes the tale all the more believable. I have a very good friend and business associate who was recently married; I trust this gentlemen implicitly and I believe he holds me in the same regard. He asked his bride whom I have never met to read the web site that libeled me when it was still online; when she had finished she stopped short of insisting that he have nothing to do with me. Thankfully my friend of over 10 years was a witness to many of the events on which the tales were spun and he was able to assuage her fears.</span><br />
<br />
<span style="font-size: 130%;"><span style="font-family: arial;">Take the High road, the Low road or the Futile road?</span></span><br />
<br />
<span style="font-family: arial; font-weight: bold;">Litigation - </span><span style="font-family: arial;">The Often Futile Road (and expensive)</span><br />
<br />
<span style="font-family: arial;">I have taken action in the civil courts and am still seeking relief; I am beginning to realize that the notion of <span style="font-style: italic;">“justice”</span>, at least at the hands of man is just a warm a fuzzy feeling of false security. I am not suggesting that victims should not seek justice through the relevant authorities placed over society, or embrace anarchy, but I do counsel libel victims to set their expectations lower rather than higher, in doing so disappointment will not be so bitter if it is indeed the end result. Notwithstanding, I am can offer some hard earned experience to those wishing to pursue legal remedies. (Remember the disclaimer)</span><br />
<br />
<span style="font-family: arial;">I would also submit that the less sophisticated the venue (courts in rural areas) the more likely it is that the Judge will be so intimidated by his or her lack of knowledge that he/she will err on the side of caution for fear of stepping on the first amendment. In my case, the Judge had previously made an off-record statement that<span style="font-style: italic;"> “this computer business is foreign to me, if it was corn farming I could deal with it”</span> or words to that effect. I filed an Emergency Motion for an injunction and had no relief after more than eight months. There are, however, instances throughout the USA where emergency motions have been treated as such and sites have been shut down or censored due to false claims and assertions within hours.</span><br />
<br />
<span style="font-family: arial;">Keep in mind that where anonymity or skilled liars are involved, it may be difficult to prove the identity of the offender easily; in turn this could lead to a tangled web of finger pointing and subpoenas leading to dead ends.</span><br />
<br />
<span style="font-family: arial;">If the plaintiff is merely a private person, the plaintiff must usually only show that the defendant acted negligently. If the private person wants to recover punitive damages, he or she must show evidence of actual malice.</span><br />
<br />
<span style="font-size: 100%; font-weight: bold;"><span style="font-family: arial;">Basic Requirements of a Defamation Case:</span></span><br />
<br />
<span style="font-family: arial;">A defamation plaintiff must usually establish the following elements to recover:</span><br />
<br />
<br />
<ul>
<li><span style="font-family: arial;">Identification: The plaintiff must show that the publication was "of and concerning" himself or herself.</span></li>
<li><span style="font-family: arial;">Publication: The plaintiff must show that the defamatory statements were disseminated to a third party.</span></li>
<li><span style="font-family: arial;">Defamatory meaning: The plaintiff must establish that the statements in question were defamatory. For example, the language must do more than simply annoy a person or hurt a person's feelings.</span></li>
<li><span style="font-family: arial;">Falsity: The statements must be false; truth is a defense to a defamation claim. Generally, the plaintiff bears the burden of proof of establishing falsity.</span></li>
<li><span style="font-family: arial;">Statements of fact: The statements in question must be objectively verifiable as false statements of fact. In other words, the statements must be provable as false. (Caveat: Expressions of opinion can imply an assertion of objective facts. See Milkovich v. Lorain Journal.)</span></li>
<li><span style="font-family: arial;">Damages: The false and defamatory statements must cause actual injury or special damages.</span></li>
</ul>
<span style="font-family: arial;"><span style="font-style: italic;">“Libel suits for material placed upon the Internet promises to be an exciting and volatile area of law. The methods that different countries currently use to resolve libel issues will have varying rates of effectiveness, and should be viewed closely as new legislation is developed to more handle the growing number of Internet libel cases. At the same time, strong consideration should be made of having an international methodology of handling Internet libel cases. Forum shopping problems and the worldly nature of the Internet may make an international approach the most realistic solution.” </span><a href="http://www.law.buffalo.edu/Academics/courses/629/computer_law_policy_articles/CompLawPapers/holland.htm">[Reference]</a></span><br />
<br />
<span style="font-family: arial; font-weight: bold;">The Low Road</span><br />
<br />
<span style="font-family: arial;">The Low Road is to fight fire with fire. In doing so you are simply going to inspire your antagonist to double his or her efforts. This is even more likely if the offender has a narcissistic or anti-social personality disorder such as in my case. The best thing you can do with this type of person is humble your pride and opt for a strategic withdrawal; that’s right! DISENGAGE. However, this does not mean you should give up. See “The High Road" option below for an explanation.</span><br />
<br />
<span style="font-family: arial;">My father is a simple but wise man; I remember him once saying of some bullies who taunted and lied about me in grade four <span style="font-style: italic;">“what they say let them say”</span>, I responded, <span style="font-style: italic;">“but some kids believe them!”</span> He replied<span style="font-style: italic;"> “the truth will remain the truth no matter how it is believed”</span>. As it turned out I settled the issue with one of the two fights I have had in my life (both under the age of 12); but the fact remains that truth does remain the truth despite what Mr. Plato may think.</span><br />
<br />
<span style="font-family: arial; font-weight: bold;">The High Road</span><br />
<br />
<span style="font-family: arial;">As mentioned, don’t waste time fighting back; you will only fuel the fire. Seek injunctive relief through the courts by all means if the case is watertight, obvious and potentially affordable.</span><br />
<br />
<span style="font-family: arial;"><span style="font-weight: bold;">1st step</span> – Give Libel Notice to the Antagonist</span><br />
<br />
<span style="font-family: arial;">Give formal notice to the libeler of his/her libel. This leave them without excuse should you seek damages through court. You have an obligation to mitigate your damages as it is within your reasonable power to do so.</span><br />
<br />
<span style="font-family: arial;"><span style="font-weight: bold;">2st step</span> – Give Libel Notice to the 3rd Party Publisher</span><br />
<br />
<span style="font-family: arial;">Blog and forum owners don’t want to get dragged into a street fight or a court battle. Although the law is somewhat unclear as to the extent of 3rd party providers and republishers of information, I found that in every case except one, the site owners quickly removed the anonymous postings made by my antagonist when I provided them with very basic proof that they were perpetuating the distribution of libelous claims. Once they have been formally provided with proof of libel they become without a moral excuse. Notwithstanding, the united States Congress has given these republishers a legal excuse through Section 230(c) of the Communications Decency Act. This law allows them to turn a blind eye to innocent victim's without fear of being sued. This is a whole 'nuther issue that gets me pretty wound up... them's fighting words to me; you can read my essay on this farce here: United States federal law opens the door to abuse of Free Speech abuse </span><br />
<br />
<span style="font-family: arial;"><span style="font-weight: bold;">3rd Step </span>- Dilution is the Key</span><br />
<br />
<span style="font-family: arial;">The best strategy is to push the offensive and libelous material off the first page of Google and as far from the top of the list as practicable.</span><br />
<br />
<span style="font-family: arial;">Chances are most people or organizations will not consider an online libel campaign as a serious risk to their future until an enemy has laid siege to their Google ramparts. As such, the appearance of remedial contingencies if any will be a simple coincidence, and probably only there if they have implemented a search engine optimization (SEO) strategy. Notwithstanding, there will probably be significant gaps and exposure to damaging defamation unless online libel threats were specifically anticipated.</span><br />
<br />
<span style="font-family: arial;">Many organizations today are investing heavily in SEO campaigns using internal efforts as well as massive outsourcing contracts with SEO specialists. I strongly suggest that if you are implementing an SEO campaign, do it properly and incorporate an effective <a href="http://www.rexxfield.com/methods.html">OLIMIRE strategy</a>. Chances are you can piggyback OLIMIRE with your SEO for no or little extra cost; it will prove to be a prudent and economical insurance policy. In addition, an SEO vendor who understands the need for OLIMIRE is likely to be a more capable SEO practitioner.</span><br />
<span style="font-family: arial;"><br /><span style="font-size: 130%;">SEO vs. OLIMIRE™</span></span><br />
<br />
<span style="font-family: arial; font-weight: bold;">For Organizations</span><br />
<br />
<span style="font-family: arial;">Search engine optimization (SEO) is the process of improving the volume and quality of traffic to a web site from search engines via "natural" ("organic" or "algorithmic") search results for targeted keywords. Usually, the earlier a site is presented in the search results or the higher it "ranks", the more searchers will visit that site.</span><br />
<br />
<span style="font-family: arial;">The <a href="http://www.rexxfield.com/methods.html">OLIMIRE</a> approach often involves using keyword combinations which are not presently important but may be in the future as a result of bad press, smear campaigns, critiques, email chain letters and so forth. The most obvious contingency being the names of key individuals in an organization who may not necessarily have a high public profile now, but may be thrust into the limelight if named (rightly or wrongly) in a scandal, accident or other unfortunate event.</span><br />
<br />
<span style="font-family: arial; font-weight: bold;">For Individuals</span><br />
<br />
<span style="font-family: arial;">My personal testimony with regard to online libel is mortifying. The allegations that were leveled against me by my antagonist were heinous to say the least, and were unfortunately taken seriously by many due to the smoke/fire assumption. I was accused of child abuse, fraud, theft and many other crimes including veiled language suggesting a murder conspiracy. My accuser’s anti-social personality is a matter of record with a trail of chaos and many serious criminal and civil offenses, and yet the allegations were taken seriously by many who were not privy to this history.</span><br />
<br />
<span style="font-family: arial;">It had taken me 20+ years to build my resume and reputation. Naturally anyone considering employing, partnering or contracting with an individual in any substantial way is going to “Google him” (or her). The first search conducted will probably be the person’s name and the name of his or her most recent business or employer. The efficiency, availability and reach of Google and other search engines has in a few short years permitted a person’s enemy to turn the victim’s greatest vocational asset into a liability; that asset being their resume or CV. In the case of an innocent victim this is a bad thing but where the allegations have basis in fact, it is in fact a good thing. I am sure many crimes have been averted due to the dissemination of information about a convicted child molester who has moved into a new community, for example. It appears at this time that the adage “you can’t make an omelet without breaking some eggs” applies.</span><br />
<br />
<span style="font-family: arial; font-size: 130%;">Invitation</span><br />
<br />
<span style="font-family: arial;">At this time I would like to invite submissions from anyone who has struggled with these issues. I am seeking case studies for a definitive book on internet libel.</span><br />
<span style="font-family: arial;"><br /><span style="font-size: 130%;">Closing Thought</span></span><br />
<br />
<span style="font-family: arial;"><span style="font-style: italic;">“A good name is a better choice than great riches”</span><br /><span style="font-size: 78%;">Proverbs 22:1</span></span><br />
<br />
<a href="http://www.ehow.com/how_4663769_defamation-exposure-online-reputation-management.html">How to Avoid The 7 Deadly Sins of Online Defamation Exposure and Online Reputation Management</a><br />
<div>
<span style="font-size: 100%;"><br /></span><span style="font-size: 78%;"><span style="font-family: arial;"><span style="font-size: 85%;"><span style="font-weight: bold;">DISCLAIMER:</span></span><br />This essay should not to be construed as legal, medical or mental health advice. This essay was not authored by or sponsored by an attorney, physician or therapist and is provided for informational purposes only and is not intended to express or constitute legal, medical or counseling advice to any reader. No attorney-client relationship between the reader and any attorney is created by the essay, and no reader should act or refrain from acting on the basis of any content in the essay except in reliance upon the advice of a qualified attorney licensed to practice in the reader’s or other applicable jurisdiction. The author is not an attorney or a firm of attorneys and is not licensed to practice law in any jurisdiction.</span></span></div><br />
<br />
<a href="https://plus.google.com/111725422289870488038?rel=author">Michael Roberts Google+</a>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com1tag:blogger.com,1999:blog-8458221353554524754.post-70554187305295370722008-08-09T00:21:00.000-07:002008-09-30T06:46:14.659-07:00Michael Roberts of Mile2 Discusses Computer Forensics<span style="font-family:arial;font-size:180%;">Michael Roberts of Mile2 Discusses Computer Forensics</span><br /><br /><a style="FONT-FAMILY: arial" href="http://www.mile2.com/Michael_Roberts_Mile2_Digital_Forensics.html"><span style="font-size:130%;">Digital Forensics Training - Not Just for Cops</span></a><br /><br /><span style="font-family:arial;">Having been involved in the IT Security Education space for some time I have found that it is a common misconception that Computer Forensics training is only for Law Enforcement. On the contrary, the FBI is currently so backlogged with computer related criminal cases related to terrorism and big crime that they will often pursue only serious felony cases. Even if the FBI decides to take on a felony case it can be subsequently shut down by their local US Attorney whose case load is so heavy that they cannot handle additional cases despite FBI's willingness to pursue.</span><br /><br /><span style="font-family:arial;">Our team experienced this exact scenario two months ago despite unimpeachable evidence of unauthorized access by an individual to a bank account which resulted in a wire fraud of more than $100,000 as well as illegal interceptions from an "efax.com" fax service and unauthorized access to Yahoo Briefcase accounts. This only leaves local or county law enforcement authorities who, despite best intentions, often do not have the sophistication or skills required to prosecute a computer crime case; and if they do, lack of quality training can result in the evidence being corrupted due to improper chain of evidence procedures.</span><br /><br /><span style="font-family:arial;">These problems leave the frontline network administrators in a frustrating situation with obvious crimes often going unpunished. Whereas, if organizations invested modestly in basic "first response" training for their network staff, then evidence can be preserved and documented in such a way that it can be admissible in criminal or civil actions. Successful actions serve further as a deterrent to would be hackers who will often choose "soft targets."</span><br /><br /><span style="font-family:arial;">Legal actions are the most obvious benefits of effective Computer Forensics training, and effective forensics capability can be built in-house for a very reasonable investment. These skills can contribute significantly to effective security policies and implementation for a given enterprise because the knowledge gained can better identify "what went wrong" in any IT problem, whether it is caused as a result of malicious actions from within or without, or from an innocent glitch or rash action.</span><br /><br /><span style="font-family:arial;">Original post : </span><a href="http://www.mile2.com/Michael_Roberts_Mile2_Digital_Forensics.html">http://www.mile2.com/Michael_Roberts_Mile2_Digital_Forensics.html</a> <a href="http://www.peppervox.com/">.</a><br /><br /><span style="font-family:arial;">Feb '06</span>Michael Roberts Internet Libel Litigation Consultanthttp://www.blogger.com/profile/10648258774946464447noreply@blogger.com1