NEW DEVELOPMENT IN THE JOHN ANDERSON “CYBERSTALKING CASE”


AMONG FRIENDS, FAMILY MEMBERS AND S.T.O.L.E.N ADMINISTRATIVE STAFF – ARE REQUESTING CANADA’S GOVERNMENT AND LOCAL OFFICIALS FOR EXTRADITION TO CANADA FOR THE TRIAL AND PROSECUTION OF FRANCESCA AMATO – MARK MUMMA – JOHN ASTER AND OTHERS WHO WERE INVOLVED IN THE UNLAWFUL ARREST OF JOHN ANDERSON – EXCLUDING   THE   RCMP

CANADIAN OFFICIALS HAVE BEEN CONTACTED 


 PART 1 : THE NEW DEVELOPMENT IN THE JOHN ANDERSON “CYBERSTALKING CASE”


Image: Mark Mumma threatens John Anderson Daughter – John Anderson was outraged. Any parent would have done the same thing or worse.  Underlined in red – Serial CyberStalker – Cyberstalkingstrictly deals with Hackers  – John Anderson is not a hacker-

UPDATE RATHER ODD:

Rather odd John Anderson’s on trial in Canada? and not “Extradited to the “U.S”?  – because no such Warrant for John Anderson Arrest exist – RCMP didn’t even contact the  FBI and the U.S. Secret Service to see if an actual Warrant for Johns Arrest was placed? – or Francesca Amato said she was attorney hell who knows?

or Francesca Amato had sent the Local RCMP a fake Cyber “Warrant” she does this all the time.  This what could have happened. She is sending victims to fake cease and desist orders victims not realizing there fake and scare them into keeping quiet. However, there have been a few victims that have come forward. When recieve such fake Documents the person is scared to death.

Its very easy to create a fake Court Document especially when these Fake Advocates work with Actual Attorneys.

 


I scrap the original Article – the Article I was going to slam the Local RCMP for John Anderson’s Arrest and his Attorney, the Crown Prosecutor and the Judge – I really thought they were involved – I was completely wrong. The article that was scrapped – in basics was a strategy to Protect John Anderson in Court. I’m glad I didn’t do the Article – Phew!!


PART 2: THE NEW DEVELOPMENT IN THE JOHN ANDERSON “CYBERSTALKING CASE”


The Tables have turned (360) in John Anderson Favor. After closely examining John Anderson’s case and looking at everything at a different angle and aspect  – realizing it wasn’t a big “Conspiracy” with the Local RCMP, John Anderson’s Attorneys, Crown Prosecutor or the Judge. They all were Manipulated. They all successfully fooled them almost, until I stepped in overlooking everything.

My theory is the Entire Article of Course and theory goes as follows:


Everyone just remembers this the entire time while reading the article – you will start to understand: A year ago Francesca Amato had a U.S Warrant served  for John Andersons Arrest – Local RCMP was flipped out over it,  why? The Canadian  Governmet doesnt reconize a “U.S Warrant” as Valid 
 Heres the Kicker – Boy this starts to Warm up real Quick – so how was it possible for Francesca Amato and Mark Mumma to place a Warrant for  John Anderson Arrest in Canada? Hmmm, I don’t know maybe John Anderson is a  Serial Cyberstalker?
A Warrant  for Cyberstalking  has Unlimited Jurisdiction – Unlimited Jurisdation as Canada – Yup

Francesca Amato Mark Mumma – John Aster had Fabricated and most likely stated they had Evidence that John Anderson was a “CYBERSTALKER” – as we see a year later – No trial – hmm it has taken Mark Mumma and Francesca Amato all this time to collect evidence because they never had evidence in the first place

I did deeper research on what exactly was cyberstalking and what was a cyberstalker in relation too, and how was it possible for Canada to recognize a “U.S Warrant”? matter of fact Canada sees a “U.S Warrant” as Invalid other words – U.S Warrant in Canada is flat out “Null and Void” John Anderson’s Arrest would be the very first time and the first time in Canada’s History that Canada Recognized the U.S Warrant.

Guess What? A Warrant for Cyberstalking has unlimited Jurisdiction.

Cyberstalking and Facebook stalking harassment, threats and libel are in two different areas on the Board, like night and day, colors, red, and blue, tall, skinny and short completely different and also 2 different areas of Law.

Deeper research Quickly realized Cyberstalker/Cyberstalking both strictly Deal with Hackers/Hacking, John Anderson is not “Identified: as a Hacker. As we all know John Anderson for the past 10 years has made a Career of Openly exposing Pedophiles Corrupt CPS, Fake Advocates.

CyberStalkers can use the “anonymity” “Referring to Hacktivist “Anonymous”

In recent years stalkers have seized on the anonymity of the Internet to commit their crimes. This has added a new dimension because many victims of cyberstalking don’t know the identity of the stalkers. That can make the fear more palpable and prosecution more unlikely.

Cyberstalking is difficult to combat because the stalker could be in another state or sitting three cubicles away from the victim. Online anonymity can make it difficult to verify a stalker’s identity, collect the necessary evidence for an arrest and then trace the cyberstalker to a physical location.


ANONYMITY: SYNONYMS AND ANTONYMS


Quick: Example of Anonymity – the Act of being invisible and or unable to be seen – facelessness, namelessness, nowhere, nowheresville, obscurity, silence. Words Related to anonymity. oblivion. inconspicuousness, invisibility, invisibleness. insignificance, Invisible, invisibility
(note): Below this article are more examples of Synonyms and Antonyms for Anonymity:(note:) Below this article are
NOTE: Cyberstalking is difficult to combat because the stalker could be in another state or sitting three cubicles away from the victim. Online anonymity can make it difficult to verify a stalker’s identity, collect the necessary evidence for an arrest and then trace the cyberstalker to a physical location.

A Cyberstalker/Hacker commits the same acts as Mark Mumma has stated about John Anderson again, John Anderson is not a hacker – False claims against John Anderson is as follows: Uttering Threats, Criminal Harassment, Defamatory Libel as false(criminal).

Also remembered someone had told me that Mark Mumma was a hacker – Like a 95 mph Fastball hit me straight in the face and exactly where Cyberstalker idea came from “Mark Mumma” – see the connection and where the idea came from?


A FOOLPROOF PLAN THAT ALMOST WORKED


Let’s go way back: – Francesca Amato made Complaints to the RCMP in Canada against John Anderson because he was exposing her – in all desperate attempts to shut him up – sent a fraudulent Cease and Disease Order” this didn’t work – Why didn’t Francesca Amato complaints go through? Because John Anderson Lives Canada because John Anderson was out of Jurisdiction. They knew they could not touch John Anderson in Canada.

The plan was a trick fool and convince the RCMP John Anderson was a Cyberstalker. They all fooled Canada’s RCMP and Fabricated and Convinced the RCMP they had clear Evidence John Anderson was a “Cyberstalker”

> The following is how easy it was for Mark Mumma Francesca Amato and John Aster to trick and full the RCMP.

Note: A “Warrant” for the Arrest of a Cyberstalker is Probable Cause

If you look at Cyberstalking and everyday threats harassments stalking and make false claims (liable) are exactly the same but Cyberstalker and Cyberstalking (s) strictly deal with hackers. Cyberstalker – Cyberstalking. go along with Cyberthreats. Cyberstalker – Cyber hacker – hides their Identity and Location completely by VPN’s Tor Web browsers and other sneaky shit.


HIDING IDENTITY:


They often copy the profiles of an existing user. The goal is to provide the identity of an actual person and to use that identity to fool the victim.

Do you see where common sense comes into play? John Anderson is not a Cyberstalker/Hacker

Note: Social media stalking is not the same as cyberstalking – You might hear people use the term “stalking” to describe following someone’s activities via their social networks. That’s different and usually doesn’t involve harassment or criminal activity. In contrast, cyberstalking can be a serious crime with legal implications.


FACT: COURTS LACK JURISDICTION IN CYBERSTALKING POST ON FACEBOOK


Fact Courts Lack Jurisdiction Cyberstalking post on facebook – Accordingly, where a cyberstalker does not directly send messages to his victim but rather posts them on a social media network or a website, a victim may be precluded from litigating her claim because of the court’s lack of personal jurisdiction over the defendant cyberstalker.


RCMP FAILED TO DO A DEEPER RESEARCH ON CYBERSTALKING/CYBERSTALKERS”


Canada’s RCMP failed to research What a Cyber Stalker and Cyberstalking was – When People research Laws or whatever their brains can come up with – they only research the Google Level and only look at what first pops- up on google search and fail to do more extensive research –

RCMP did exactly this – failed to do deeper research and how easy it was for Francesca Amato and Mark Mumma and whoever else to pull this off. RCMP just google searched Cyberstalker, first words popped up was stalking threats, Harassment and Liable. What the RCMP failed to realize CyberStalker – Cyberstalking strictly deals with “Hackers” –

What the RCMP did find a Warrant for Cyberstalking/Cyberstalker has unlimited Jurisdiction from anywhere in the world. From the United States to Canda, China, Australia. If you was a Cyberstalker that lived on the Moon if Law enforcement had the means to go to the moon – they would place you underneath arrest.


RCMP DID RESEARCH “WARRANT” FOR CYBERSTALKING HAS UNLIMITED JURISDICTION


 

Cyberstalking exactly resembles actual threats, Physical Stalking, Harassment and liable. This completely fooled the RCMP’s – This would fool anyone – I don’t put full blame on the Local RCMP’s John Anderson’s Attorney, Judges or the Crown Prosecutors Office they were manipulating and tricked into believing what John Anderson was doing was Cyberstalking. Luckily John Anderson plead “not guilty” –

As myself, ongoing Study and research (24/7) of Law for the past 7 – roughly has taken me 4 1/2 years to obtain a High Comprehension and understanding of Law. The person that do not study Law or most of the time. Never achieve high Comprehension level to grasp what is needed to help themselves Then stuck in the losing battle.

 

 

I can immediately look at a Case dissect it then pick it apart.  I have done this with over handfull Cases. I can determine exactly whos involved who it’s connected to

And what steps to take to avoid danger

 

It’s understandable why people don’t listen because there are thousands of Foreign Agents (Attorneys) Practicing without a LAw License claiming they have brought homes Children if y

Depending on the Circumstance(s) – an actual “Cyberstalker” like an FBI informant completely Mask themselves as “Anonymous” using VPN’s different Web Browsers as Tor and so forth – Hacker’s most of which go untraceable without ever being caught. Is John Anderson a “CyberStalker?” No, and absolutely completely ridiculous. Has John Anderson ever masked himself or hid behind a Computer screen and exposed Pedifile, Scammers? using VPN or Tor Browsers? No never – for 10 solid years John Anderson has openly exposed several individuals, by facebook – twitter, Youtube and other means – Has John Anderson ever been sued for threats, Stalking harassment and held liable for slander fabricating and spreading false rumors about people that wasn’t true? Nope never – given another fact not only that has post overwhelming evidence proving that who these people really are and what crimes they have committed.


RIGHT NOW – EVERYONE FACEBOOK AND TWITTER GO BACK 10 YEARS


Right now, everyone on facebook, twitter – go back 10 years find Articles News reports Complaints filed, Protection Orders and Warrants for John Anderson arrest for “Cyberstalking” . In fact, you won’t find anything. Not up until a little before John Anderson’s arrest Mark Mumma labeled John Anderson as a “Cyberstalker” –

More you read this article and understand what a Cyberstalker really is – also proving John Anderson isn’t serial “CyberStalker” – and also proving Mark Mumma made of up a Fabricated Story to sell a Book like Francesca Amato’s (fire!!! – Fire!!!)

Sorry got out of hand for a sec, I was referring to people “Burning” Francesca Amato’s Book on Facebook Live.


OPENLY EXPOSING AND CONFRONTING IS NOT CYBERSTALKING


Openly Exposing and confronting and bringing awareness that pedophiles child abusers and Corrupt Fake advocates is not Cyberstalking, Harassment or Liable especially when Evidence against these Pedo-fraudsters is all over the Internet. Aren’t pedophiles child abusers on a registry? Yes they are

Its the law and these people are exposed in our communities to keep Families, Parents – Isn’t this what John Anderson does? John Anderson bringing awareness so people don’t fall a victim of Scams and trying to keep families Parents and Children safe by pedophiles in these groups and getting involved with Punished 4 Protecting and having their child taken.

Within these Fraudulent Organizations are very knowledgeable people that know the Law but call themselves Attorneys that don’t have a license to practice Law also known as (Aka) “Foreign Agent(s) None of which have stepped foot in a courtroom or won a court case especially brought a child home.


SPEAKING OF REGISTERED SEX OFFENDERS – JOHN ASTER


Speaking of registered sex offenders a Child Predator, one Person comes to mind – AXJ: Action for Justice – Ceo John G. Aster who was in fact Charged and convicted for downloading 15,000 images of child porn. The reason John Aster is not on a Sex Offender Registry because Australia protects Pedophiles having a closed sex registry – meaning its not an open registry for public viewing.

How John Aster escaped conviction? Aster escaped by a hidden Law called a “Non-Conviction”. “Non-Conviction” Law only exists in Australia. In basics – “Non-Conviction”. The only time the Conviction comes up, only if the Child Predator applies for Job working with or around Parents and Children. For this reason, Australia having a closed sex offender registry for this fact is why John Anderson became so involved in exposing. Audio Evidence – John Aster is openly Admits to downloading 15,000 images of child pornography –

Note: Mark Mumma the supposed Hacker doesn’t know how to search google and can’t seem to find the “Non-Connection Law or AXJ being a Pedo Scam Ring and can’t find post exposing John Aster as a Pedophile? Nice excuse Web Guy.


FRANCESCA AMATO – MAKES FALSE CALL TO CPS – MARK MUMMA THREATENS JOHN ANDERSONS, DAUGHTER


Mark Mumma and others threatened John Anderson Daughter. What mother or father wouldn’t rage back at someone making threats to their child? And yes, Mark Mumma there is evidence. Francesca Amato went as far as making a false call to CPS in Canada over child abuse. CPS showed up and realized and made a false call, apologized and came back with a coffee

This is how far Francesca Amato – Mark Mumma and John Aster has gone to stop John Anderson from exposing there own Corruption the same corruption they are supposedly exposing, its all an “Act” because they are all taking part in Defrauding, scamming and other illegal activities they are involved in “Ohh I like how that sounded” did you? Ha Ha

What John Anderson has stated about Francesca Amato Mark Mumma John Aster is not only correct John Anderson has been point accurate for 10 years straight


DOES JOHN ANDERSON LOOK LIKE A CYBER STALKER TO YOU?


Does John Anderson look – like a Cyberstalker to You? John Anderson has hundreds of Facebook Live Videos, Youtube Video and posts all over Social Media – JOHN ANDERSON IS NOT A CYBERSTALKER


 


 


FOLLOWING STRICTLY DEAL WITH CYBER STALKER/HACKERS


Sending manipulative, threatening, lewd or harassing emails from an assortment of email accounts.
Hacking into a victim’s online accounts (such as banking or email) and changing the victim’s settings and passwords.
Creating false online accounts on social networking and dating sites, impersonating the victim or attempting to establish contact with the victim by using a false persona.

> Posting messages to online bulletin boards and discussion groups with the victim’s personal information, such as home address, phone number or Social Security number. Posts may also be lewd or controversial – and result in the victim receiving numerous emails, calls or visits from people who read the post online.

Signing up for numerous online mailing lists and services using a victim’s name and email address.

Cyberstalking is a serious crime, and no one wants to become a victim. One way to help protect yourself is to keep your personal information private on the internet. That’s a start. But there’s a lot more to know about how cyberstalking works and how to protect against it.

What makes cyberstalking possible? The short answer is technology. Technology opens our lives up in many ways. You can chat with someone whether they’re in the next room or in another country with ease, through a variety of devices. You can access most of the world’s information within a matter of seconds.

Signing up for numerous online mailing lists and services using a victim’s name and email address.

– Classic cyberstalking behavior includes the tracing of the victim’s IP address > Hacking into a victim’s online accounts (such as banking or email) and changing the victim’s settings and passwords.

Social networking presents security issues for victims of stalking. A profile on a social network might include information such as your email address, phone number, general (or even specific) address information, birthday, legal name, names of family members, and even minute-to-minute updates on your location. If a victim has a public profile, a stalker could easily access any information posted to the social networking account. Even with strong privacy settings or a private profile, a stalker might be able to access your account. A few of the ways this can be accomplished include:

They often copy the profiles of an existing user. The goal is to provide the identity of an actual person and to use that identity to fool the victim.

Here are a few ways to spot a fake profile and help protect against catfishing.

Do a reverse Google image search of the user’s profile picture. If they’re a fake, it will lead you to multiple profiles or to a website where the catfisher obtained the image.

Check how many friends the user’s profile has. An average Facebook profile has around 300 friends. Catfishing profiles often have significantly fewer.

Examine the user’s photos carefully. A real person will often have photos of themselves with friends and family or at public events. Catfishers often have selfies or modeling shots. Also, check to see if other people in their photos are tagged, helping to verify that they are friends with the people in the photos.

If you suspect you’re being catfished, consider asking the user to Skype via webcam to verify their identity. If they make up excuses, that could be a red flag.

Anti-cyberstalking tips

Here are a few pointers to help you protect against cyberstalking, whether it’s directed at you, your devices, or your family.

Be careful about allowing physical access to your computer and other web-enabled devices like smartphones. Cyberstalkers can use software and hardware devices (sometimes attached to the back of your PC without you even knowing it) to monitor their victims.

Be sure you always log out of your computer programs when you step away from the computer and use a screensaver with a password. The same goes for passwords on cell phones. Help your family and kids to develop the same good habits.


PROTECTION AGAINST CATFISHING


Here are a few ways to spot a fake profile and help protect against catfishing.

Do a reverse Google image search of the user’s profile picture. If they’re a fake, it will lead you to multiple profiles or to a website where the catfisher obtained the image.

Check how many friends the user’s profile has. An average Facebook profile has around 300 friends. Catfishing profiles often have significantly fewer.

Examine the user’s photos carefully. A real person will often have photos of themselves with friends and family or at public events. Catfishers often have selfies or modeling shots. Also, check to see if other people in their photos are tagged, helping to verify that they are friends with the people in the photos.

If you suspect you’re being catfished, consider asking the user to Skype via webcam to verify their identity. If they make up excuses, that could be a red flag.


MARK MUMMA, FRANCESCA AMATO, JOHN ASTER AMONG OTHERS – FILING FALSE REPORTS OF CYBERSTALKING – THEY ALL ARE NOW HELD EQUAL TO A CYBERSTALKER


As in Child abuse, if a person knows Child Abuse is occurring and does not stop and report Child Abuse – they are all held equally and the same as the Child Abuser or Abusers and charged and prosecuted with full Legal Penalties, fines, and punishment. The same with filing false Reports of Domestic Violence and Child Abuse.

Filing False Report of John Anderson being a “Cyberstalker”

Mark Mumm, Francesca Amato John Aster or who every else was directly involved in John Anderson Arrest that made false reports that John Anderson was a “CyberStalker” they are held directly Liable and held equally the same as a “Cyberstalker” and charged and prosecuted with full Legal Penalties, fines, and punishment.

(stolen.news) website: Pretrial Begins November 4, 2019 for Mark Mumma, John Aster and Francesca Amato for making false reports that John Anderson was a Cyberstalker all 3 will be Tried and Prosecuted. Also tried and prosecuted for making threats to a child Tiana Anderson.

162 Counts of Making false reports of (Cyberstalking) Criminal Harassment by (Cyberstalking)

These Counts rise higher as Mark Mumma, Francesca Amato, and John Aster file more false claims of Criminal harassment by Cyberstalking, false claims of Uttering Threats by Cyberstalking, false claims of liable Criminal by Cyberstalking.

70 counts of filing false reports of harassment by Cyberstalking via telephone preserved

92 counts of filing false of criminal harassment By Cyberstalking – via social media (video) preserved

This will be proved November 4, 2019 – they will all sit in prison for over 100 years.


END OF ARTICLE


More Examples of

Words Related to invisible: unnoticed, unremarked, unseen. impalpable, imperceptible, inappreciable, indistinguishable, insensible. faint, indistinct, obscure. concealed, hidden.

anonymous. unsigned, nameless, unknown, unacknowledged, uncredited, pseudonymous, unnamed, authorless, unavowed, unclaimed, unidentified, secret, with the name withheld, of unknown authorship, without a name, bearing no name, incognito, anon., faceless, undifferentiated, indistinguishable, nondescript.

Synonyms for invisible: little, low-resolution, faintly, unfocused, blurred, ink, ill-defined, indefinite, unobserved, indistinct, unnoticed, undetected, impalpable, …

1 answer Synonyms for invisible: little, low-resolution, faintly, unfocused, blurred, ink, ill-defined, indefinite, unobserved, indistinct, unnoticed, undetected, impalpable, …

Missing: anonymity ?| ?Must include: ?anonymity

Invisibility Synonyms & Antonyms | Synonyms.com


MORE ABOUT CYBERSTALKING


Here are a few ways to spot a fake profile and help protect against catfishing.

Do a reverse Google image search of the user’s profile picture. If they’re a fake, it will lead you to multiple profiles or to a website where the catfisher obtained the image.

Check how many friends the user’s profile has. An average Facebook profile has around 300 friends. Catfishing profiles often have significantly fewer.

Examine the user’s photos carefully. A real person will often have photos of themselves with friends and family or at public events. Catfishers often have selfies or modeling shots. Also, check to see if other people in their photos are tagged, helping to verify that they are friends with the people in the photos.

If you suspect you’re being catfished, consider asking the user to Skype via webcam to verify their identity. If they make up excuses, that could be a red flag. Anti-cyberstalking tips

Here are a few pointers to help you protect against cyberstalking, whether it’s directed at you, your devices, or your family.

Be careful about allowing physical access to your computer and other web-enabled devices like smartphones. Cyberstalkers can use software and hardware devices (sometimes attached to the back of your PC without you even knowing it) to monitor their victims.

Be sure you always log out of your computer programs when you step away from the computer and use a screensaver with a password. The same goes for passwords on cell phones. Help your family and kids to develop the same good habits.

Make sure to practice good password management and online account security. Create complex passwords and never share them with others. And be sure to change your passwords frequently. A password manager can help with this task.

Delete or make private any online calendars or itineraries — even on your social network — where you list events you plan to attend. That information could allow a cyberstalker to know where and when you’re planning to be somewhere.

A lot of personal information is often displayed on social networks, such as your name, date of birth, where you work, and where you live. Use the privacy settings in all your online accounts to limit your online sharing with those outside your trusted circle. You can use these settings to opt out of having your profile appear when someone searches for your name. You can block people from seeing your posts and photos, too.

If you post photos online via social networks or other methods, be sure to turn off the location services metadata in the photo. The metadata reveals a lot of information about the photo — where and when it was taken, what device it was taken on, and other private information

Most often, metadata comes from photos taken on a mobile phone. You can turn this off — it’s usually a feature called geo-tagging — in your phone’s settings.

Use a security software program such as Norton 360 with LifeLockTM to help prevent spyware from being installed onto your computer via a phishing attack or an infected web page. Security software could allow you to detect spyware on your device and decrease your chances of being cyberstalked.

If you break up with someone that you were in a relationship with, be sure to change all of your online passwords. Even if you think that your ex-partner may not know them, it’s a good practice and an extra layer of protection.

Educate yourself about cyberstalking It’s smart to know how cyberstalkers might target you.With that in mind, never provide any personal information about yourself online, no matter how safe you think it might be.Also, never indicate your real name, address, phone number, full date of birth, email address, or the city where you live to someone you don’t know personally. Be aware of your own online presence

How much information can be found out about you online? Have you ever Googled yourself? If not, you should, just so you can be aware of what personal information is out there about you.Try different combinations. Start with just your full name. Then try your name plus your phone number, your name plus your home address, and your name and your birthdate.

You can also use a Google image search with the same information to see what sites may be hosting information about you. Don’t be shy about searching for yourself on social networks, too. You can also search for your family members to see what information is available about you through their profiles. If you find that your sensitive personal information is easily available, there are a few ways you can get it removed from the internet.

In many cases, if a website has information such as your address, telephone number, date of birth, or photo, you will have to contact the website and ask to have the data removed. If it’s sensitive personal information such as your Social Security number, bank account, or credit card number, you can contact Google and they will remove it.

Report cyberstalking

If you encounter someone that is engaging in cyberstalking behaviors and it seems serious, or you begin to receive threats, you should report it to the police. Keep in mind many police departments have cybercrime units, and cyberstalking is a crime. If you’re being cyberstalked, remember to keep a copy of any message or online image that could serve as proof. Use the “print screen” or other keyboard functions to save screenshots.

If you suspect that someone is using spyware software to track your everyday activities, and you believe you may be in danger, only use public computers or telephones to seek help. Otherwise, your efforts to get help will be known to your cyberstalker and this may leave you in even greater danger.

ANTI-CYBERSTALKING TIPS:

Anti-cyberstalking tips:

Here are a few pointers to help you protect against cyberstalking, whether it’s directed at you, your devices, or your family.Be careful about allowing physical access to your computer and other web-enabled devices like smartphones. Cyberstalkers can use software and hardware devices (sometimes attached to the back of your PC without you even knowing it) to monitor their victims.

Be sure you always log out of your computer programs when you step away from the computer and use a screensaver with a password. The same goes for passwords on cell phones. Help your family and kids to develop the same good habits.

 

 

————————————————————————————————–

 

—————————————————————————————————–

 

 

 

Please follow and like us:
error

Facebook Comments

1 thought on “NEW DEVELOPMENT IN THE JOHN ANDERSON “CYBERSTALKING CASE”

Leave a Reply