back to article listing

Network neighborhood watch

Very rarely do I get the chance to read books that can entice me strongly enough to take action. The most recent one I read is Internet Forensics: Using Digital Evidence to Solve Computer Crime by Robert Jones (ISBN 0-596-10006-X, O’Reilly Media).

The popularity of the Internet has resulted in a sad development — the proliferation of spam or unsolicited e-mail. Worst, fraud or misrepresentation is also happening. This is where we receive e-mails from senders that pretend to be from Citibank, PayPal and eBay, among others, tricking us to change our password or update our account information. This is now also referred to as phishing.

For those of us who know well enough about this, we delete them right away. However, there are those who open it and fall into the trap of opening lewd attachments or responding to requests for more personal information.

As a result, government agencies began receiving complaints from people who ordered products that never arrived and those about websites that ceased to exist following certain transactions.

Robert Jones’ book encourages Internet users to take action. It encourages the building up of communities of people who can be proactive in detecting spam and fraud and share information to generate further awareness on these plots to victimize innocent Internet users.

His book teaches Internet users how to dissect e-mail, websites and documents to detect spam sources, fraud, spoof or misrepresentation, among others. To further increase your knowledge on this subject, there are several websites that one can refer to, such as the Spamhaus project (, Anti-Phishing Working Group ( and Digital PhishNet (, among others.

In 2001, I remember becoming a victim of fraud or misrepresentation. A local Internet user sent me an email promoting several product lines all being marketed by one company. This person even sent the e-mail to my own discussion group where my e-mail address is allowed to post messages without moderation. After that experience, I had to moderate my own messages in my forums.

Although this may not necessarily result in Internet users like us pushing for prosecution, spam senders can be prevented from doing this to others. They will have to think twice about the risks they are taking, especially after they are put in a hotlist.

If a complaint shall be made again regarding a fraud signature similar to what happened to me, I will not hesitate to cooperate with the investigation. This is the reason I never deleted the spoof message in my discussion group. It is being reserved for that purpose.

Recently, there’s a prominent pseudo hacker who have been publicly embarrassing various websites with their weaknesses.
However, perhaps their popularity have gotten into their heads and they started hacking into websites that are direct competitors of the enterprise that they are working for.

As there’s always a signature or trace of the perpetrator in a crime scene, the last thing one wants to do is mess around with a competitor’s Internet servers. They won’t do it for the money but simply to ruin the reputation of a business competitor, because its (competitior) unethical (even criminal under the E-Commerce Law) practices may be worth it.

It is time to take our Internet back. The more vigilant Internet users will be in combating cybercrime, the less liberty unscrupulous individuals will have in hurting future generation of Internet users.

By Janette Toral
Digital Filipino

Planning Your Investment  |  Investing in the Philippines  |  SEC Registration Requirements

Latest IT Solution at DATE2004  |  What is Outsourcing  |  Why the Philippines?

home  |    articles    |    news    |    portfolio    |    about us    |    partners    |    management team
outsource services    |    careers    |    tell us what you need    |    see our operations    |    contact us    |   
sitemap    |    resources

Copyright © 2005 Outsourceit2philippines. All Rights Reserved.

Our Partners