ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Cyber Crime, Intellectual Property, Help Authorities Stop It

Updated on March 8, 2015

Be Careful Who You Invite In

Even if you have the best anti-virus, and firewall, if you enter an unsafe site, and make a connection, you may have invited the proverbial vampire in.
Even if you have the best anti-virus, and firewall, if you enter an unsafe site, and make a connection, you may have invited the proverbial vampire in. | Source

Cyber Crime Is Not What Offends, But What Breaks The Law

There are some readers who are easily offended.

On this website I can find offensive material usually published by a person who is extreme in their religion.

Some individuals want life "G-Rated," that is unrealistic, for the rest of the world, but for those who choose to cloister their thinking away from some subjects, forms of nudity, and language.

Readers who waste time and effort flagging content they just don't agree with - no matter how well written. These will flag authors who maybe use some bad language, or show too much of a body part. Those are not Cyber-Criminals.

If you are offended by this language or use of body parts in an article or other Internet Publication, click the X at the upper right-hand corner of the page. Self-censor. Work out your own salvation...

Close it, and move on.

If you view content that appears to be exploiting children or harming another person contact the appropriate agency.

Don't look at it.

Move on to someones site or publication you can enjoy, use your energy to encourage or promote material you love, or can learn from.

Having Your Unique Content Stolen Is Like...

Having your unique content stolen, is like working, spending, and laboring to grow a garden, and no matter what you have done, 2 weeks of triple digit temps can take it all away
Having your unique content stolen, is like working, spending, and laboring to grow a garden, and no matter what you have done, 2 weeks of triple digit temps can take it all away | Source

Steps to Catch Cyber-Criminals

I will explain in simple terminology, and have included links for taking steps to recover your Intellectual Property.

Turn in a Fraud, Stop Internet Criminals, and make the Internet a friendlier place.

  • The main action that will be taken against the trespasser, who pirated Intellectual Property, is they will be asked to remove it.
  • If the thief has benefited financially, there can be many harsher sentences imposed.

Sometimes people innocently use IP that was pirated before they got it.

An example: When I was working on "Bad Girl, bad seed, give me those shoes...", I used YouTube Videos for props in my Hubs. The next morning, I had a notice that Warner Brothers had removed the contents of the YouTube videos, because the person who posted them on YouTube did so without permission. it was simply removed. I was not in trouble. Now whenever I use a follow-back link from another resource like YouTube™ I simply leave a comment under the article, photo or video.

  • Url Copied
  • Where found
  • Purpose for Use of Linked Content
  • Give Them The Title of the Item

I have not had anyone ask me to remove content, but it has been removed because it belongs to an other person or entity, that was not credited or cited.

If your complaint or problem is found to be valid and the Cyber-Cops take on your case, it is best to gather all of the possible evidence you can safely harvest.In most cases such drastic measures will not have to be taken. Simply flagging a problematic Hub will often call attention to an errant Hub.

Be A Detective, Build Your Case

Like any job or detective show highlights the importance of "chain-of-custody", or "chain-of-command". This means if your City or County, or State has an active Cyber-Crimes project, department or division, you may get more help simply notifying them.

If you do end up turning your "case" to any agency, make sure you get a receipt for any information or evidence you leave with them. Keep copies. Ask them for a Time-Frame, and if they will follow up. Depending upon the seriousness, if after 90 days, nothing has been done, contact the next in the chain, or go ahead and file directly with the Cyber-Crimes Division.

Keep in mind, using Federal resources for revenge or fun will land a person in a world of hurt (fines, jail time, loss of internet privileges, grounding), so consider before you file a fictitious complaint.

The Very First Step: Notify the Administrators of the Website that has the Violation, Theft or Crime. Notify all sites affected, UNLESS they are sites that are unsecured, or show Red/Yellow on your Internet Security, do not go onto them!

You can safely click on a "Cache" of the Web Article. If it does not show "cache" do not click on it. If you are in dangerous territory on the web, even by catching a snapshot of the site (cache), it can be tracked back to you, if the site or owner are very sophisticated.

(If you are on the World Wide Web without Internet Security and a Firewall, it is the same as having unprotected sex with 6 million other people - in terms of the personal danger there is in that)

Security, Firewalls, and Spam Filters

An internet user, can have better security and firewalls than the FBI, CIA, NRA...etc., but if a user on the "secure" computer venture off into web sites that are not secure, the user has opened the door to the wild web world.

Having opened the door, the system is now open to anything.

Accessing an unsecured or dangerous site, is like having a million dollar security system on a mansion, but when you leave, you don't lock the door or set the alarm.

Cleaning out your cache on your computer.

Security wise - I am not a computer expert.

I do know about internet crime, predators, and how scum-bags can get into your system.

There are instances when your computer might be in the process of getting breached. (War Drivers) When this happens your computer will act funny.

Depending on how sophisticated your internet security is, depends upon how severely a hacker can infiltrate your web system.

Like a car, when it is tuned up, and running like it was built to run, it is easy to tell when something is amiss.

When your computer has had its memory cleaned, caches swept, fragmented files defragged, a thorough security scan, and a shut-down and/or restart, you will know when something is not right in your cyber world.

Most newer computers have a program where you can watch your entire inside of your system and do check ups.

Conduct Regular "House Cleaning" On Your Computer

A good computer "house cleaning chore" is to 1). Tools, 2). Options, 3).Clear Browsing Data, 4).Delete everything except passwords, unless you share your computer with the most trusted soul in the world...Everything. Different versions of software have different names for this. IE has a tab that says , Safety > Delete Internet Browsing History

If you have not ever done this, it could take hours. It is recommended to do daily, weekly, monthly whatever. If you do a lot of searches, do it a couple of times per day. Your information sort of hangs out and will clog up the pipes. Your computer will run much better.

Most of you have been around the e-world long enough to know to delete junk mail, and spam.

It is good computer housekeeping to delete read e-mails.

Delete Spam forever.

Do not delete confidential information, unless you have an electronic shredder.

The last quick and cheap tune-up for your computer - Delete all of your "Sent" Mail from all of your accounts. There is no numbers showing on most programs for sent. They just sit there. Remember to do this in your Social Networking sites too. All that data, just sitting there.

Once you have done these steps, do a restart on your computer. It should be better!

Props to Sweetsusieg!

Always give props where props are due. Sweetwusieg was kind enough to take extra time to warn other Hubbers including me that there was a possibility there may be pirated Hubs about...(Makes me want to talk like a Pirate but, this is serious).

Due to her quick action and the quick movement by Hub Administrators, The gig was Up! The Pirates had to drop their booty! Way to go Ms. Sweet Susie!

One reason HubPages is so successful is because it is a part of a wheel of activity, community and artistic, making an endeavor to swap knowledge, and help one another. If you are a serious writer, or you just "must write", be a part of this "wheel of writers, photographers, preachers, teachers, grumps and lunatics.

You Found Something Worth Reporting

1). Since this is a Hub, on HubPages, let me say that HubPages Administrators do an excellent job at looking into valid reports, and stopping unethical, and illegal activities on HubPages. They are concerned and do want to know when someone is in violation of HubPages Terms of Service.

2).On HubPages , if you are almost certain someone is in violation of HubPages Terms of Service and/or use. While you are on the "alleged offending" Hub or Hubber's page, "Flag" the Hub. You will be given choices as to the reason you feel it is a violation. If you are not positive, there is a place for "Other" where you can explain why you feel it is a violation. You may not get a response unless the seriousness warrants it, but the HubPages staff will quickly check it out, and have bad stuff removed.

3). If it is outside of HubPages, but it is connected to HubPages in anyway, you can click on Help in the upper Right-Hand Corner. Check out "Other HubPages Resources" and "Unanswered Questions". At the bottom is "Contact Us."

4). If your concern is on the www (world wide web).

  • Your Blog or other website, is being used by an entity without your permission,
  • You notice another Hubbers' work whom you follow, posted by someone else
  • or, when you Googled your Blog, and it is coming up linked to Holland Honies for Horny Honkers, your name or Intelligence is now hooked up to a pornography site. Those who operate outside of legal boundaries of websites' Terms of Service (TOS) will use legitimate and popular blogs to drive traffic to their sites. Notify your co-writers, who's work is out there know your findings.
  • Make sure you gather facts not supposition.

IP Law and the Biosciences I Luncheon Keynote

Follow Your Instincts, Take Action.

What To Do:

Go to the offending web page. USE CAUTION when clicking on one of these sites. Make sure your security shows it is a safe site. if it does not , simply scroll your mouse over the active url and click the "other button", and you should get the option to check properties, or identify what the url address is, take a snapshot of that, or just write it down.

Capture a picture of what is showing on the Screen - Use your Ctrl / Alt / PrntScrn Key, that shows the url ( ) in the picture.

Go to your open Word Screen , that is ready for data. Use your Ctrl "v" Button to leave the 'snapshot' on the Word Page. Give it a title. If words on the screen aren't legible, but important to your case, go ahead and enter the data that is visible to you, but possibly not clear on the 'snapshot'.

Save it in your Folder created to gather evidence. Make sure Date/Time Stamps are accurate, and reinforced on your documentation. Because stuff can disappear or be hidden on the web, for important info, containing URL's and web links of the case you are building, it is highly advisable to make a PDF file / memory copy and/or print a hard copy.

In some cases of the theft of intellectual property, or that your work is linked to child pornography, there is a possibility that Federal Agencies and other Legal types may get involved.

They will ask you can you get the "properties" (google chrome and opera say "inspect element" it shows everything) of the offenders and / or pages, links and photos. If it is an entity who does this often or you have stumbled on a big nest, when you check the properties, or do the url roll over, you will see the same names or sub names popping up.

Follow your gut.

To get the "properties" information, do the "other button click " (the Right button) on the mouse. The "other button " will present a drop down box with tabs and choices. Usually at the very bottom, is "Properties" (or inspect element). The information is like a drivers license and important information is contained there. It is a good idea to 'snap-shot' these and again, re-type information that is not clearly read on the Screen Capture. Save to your Folder.

Danger Through The Portal

The keyboard is a portal to the world. There are dangers and delight in equal measure. Be careful like you would on the streets.
The keyboard is a portal to the world. There are dangers and delight in equal measure. Be careful like you would on the streets. | Source

Benefits of Google Analytics

Google Analytics has many tools that can help anyone who is concerned about their internet traffic, and monitor how their internet publishing is doing. My blogs are much older than my time with HubPages, and I began to see a sudden surge of growth in an Asian Country that could not be explained by a simple growing interested in my Blog posts.

The topic of my two blogs are very topic driven, and there are only two areas of interest that would be concerned and such growth in this area did not make sense. I began googling my blogs, key words. (I have my AdSense set so when I click on my pages, it doesn't count as a visit from a searcher). I found my blog links being used to drive pornography.

I saw the growth on Google Analytics and as happy as i was to have thousands of new hits and back-links to my Blog, it was not a good thing. Reporting this type of activity to Google is not the easiest. It is 100 Times easier with Google Chrome users. This was fairly recent, and I switched to Google Chrome. They have more security and filters for blocking out Adult content. Per your settings on via Google.

If Google Analytics Shows a Sudden Surge in Traffic...


get directions

Paris, Arkansas:
Paris, AR 72855, USA

get directions

Paris, KY:
Paris, KY 40361, USA

get directions

Paris, Peru:
París, Industrial Aviación 1a. Sección, 78140 San Luis Potosí, S.L.P., Mexico

get directions

How the FBI fights Cyber Crime

© 2010 Lori J Latimer


    0 of 8192 characters used
    Post Comment

    • LillyGrillzit profile imageAUTHOR

      Lori J Latimer 

      6 years ago from The River Valley, Arkansas

      The reason I approved this comment is because when I put the name of the person making the comment, many Hubs or Hubbers came up under this name, or varying degrees of this. "Hell man, canada visa apply, labour market opinion, email kara ambassy, issue" were english words pulled out of this. Hmmm

    • profile image

      Rajat Kishore 

      6 years ago

      Jun 21, 2012 by


      hell man. maine rajdeep ki baaton mein aake canada visa apply kar diya lakho rupiye deke

      bina labour market opinion ke .. baad mein maine ye sab padd ke email kara ambassy mein

      waha koi lmo issue nahi hua mere naam pe ye gadhe ka bacha nakli hai rajdeep harami mere paise khaa gaya

    • LillyGrillzit profile imageAUTHOR

      Lori J Latimer 

      7 years ago from The River Valley, Arkansas

      They can somehow hack into AdSense, I would definitely look into it. I had to get after another porno site, linking to my blog again. Google advised I change my password for Google AdSense, that should stop any hackers. Whenever you have an unknown peak, and cannot find out why, check Google Analytics and try to find out what's up. Sometimes, you just finally reached a place in Google Search that is getting many hits. I hope it is all good and successes...Thank you for the read, and comment. :0)

    • Ms Dee profile image

      Deidre Shelden 

      7 years ago from Texas, USA

      Great info, LillyGrillzit! Trying to digest all this. Does this mean that the one day a few months ago when the traffic to one of my hubs suddenly shot up 10 times more than usual, that I might have been a victim of cyber crime?

    • LillyGrillzit profile imageAUTHOR

      Lori J Latimer 

      7 years ago from The River Valley, Arkansas

      Thank you chan0512! Glad to see you came by. The Best to you!

    • chan0512 profile image


      7 years ago from Camarillo, CA

      Great hubs about cyber crime! Learn more stuff today. Thanks for sharing this useful information.

    • LillyGrillzit profile imageAUTHOR

      Lori J Latimer 

      7 years ago from The River Valley, Arkansas

      I agree TattoGuy, so glad this piqued your interest. Thanks for the read and very thoughtful comments.

      As with most of us who don't discuss our weaponry. We don't talk about it, we just use it when necessary. Unless it is to give a young punk a final warning, giving the violator a chance to change their present action and go on...Karma sometimes needs assistance - believe me :0)

      - I am very kind and nice - But not weak. My first Title was Cyber Crime and Why You Don't Want to do It to the Wrong Person! But - It is not my intention to challenge, but to assist, so I mellowed it out a bit.

    • profile image


      7 years ago

      Great hub Lily but as my friend co runs Blackhatworld I have my own way of dealing with people that try and hack me or mess with me online. Cyber Criminals and Cyber Bullies need to learn that word Karma, doncha think ; )

    • LillyGrillzit profile imageAUTHOR

      Lori J Latimer 

      7 years ago from The River Valley, Arkansas

      dallas93444, I learned something brand new today. I didn't know that the "copyright laws are applicable immediately upon expressions..."

      Thank you, this will allow me to finish a couple that will probably turn into novels, and I don't want some hotshot stealing my very unique perspective and ideas.

      The Best! BOLO some interesting fiction. Write on! - Thank you for coming by giving this a read, and leaving a comment. I hope you find help and a new angle for prevention. The Best.

    • profile image 

      7 years ago from bear, de, 19701

      This is great info to keep my eyes on crime. Preventive actions take place in any area. Before everything is late. anyway, Thanks a lot.

    • dallas93444 profile image

      Dallas W Thompson 

      7 years ago from Bakersfield, CA

      "I have a couple of hubs I am waiting to copyright before publishing. It is the way of the world..." I gotta ask, "Why bother to have copyright?" Given the copyright laws are applicable immediately upon your expression of your original ideas, concepts and expressions. Yes, you can formalize the process...Why do you feel the need? You are a great believer and staunch supporter of human rights and vital issues... seems incongruous. To do the right thing is an honor... One that you have mastered.

    • LillyGrillzit profile imageAUTHOR

      Lori J Latimer 

      7 years ago from The River Valley, Arkansas

      Bayoulady, you can still scroll over her site and do the "other button" and get enough info to turn her in and let HubPages know. Good Luck. Also, the first link on the resources I left will probably help you!Thanks for the read, vote and visit. Get a good friend or HubPages to track it for for you...Please don't let it go.

    • bayoulady profile image


      7 years ago from Northern Louisiana,USA

      I had my hub about my deaf sister copied word for word on a BLOG site called something like hot bikini bodies (on an India site). I stupidly just left a message to her to take it down. Didn't get the url. I googled it again the next day to get the url. It was still on google, but she had blocked me.Chalk that up to dummmy me. If i had known all you put here, i would have know better. I am bookmarking , and of course rating up.

    • LillyGrillzit profile imageAUTHOR

      Lori J Latimer 

      7 years ago from The River Valley, Arkansas

      Ms Katiem2! Thank you, I learned this stuff the hard way. It thrills me to be of assistance. Thank you for coming by for a read and comment. :0) Peace.

    • katiem2 profile image


      7 years ago from I'm outta here

      Awesome, just wonderful cyber crime is out there and we all wonder about it and what to do. How fantastic that you've researched and delivered to us exactly what the do in the case of Cyber-Crime - How to Help Administrators and Authorities Stop It! You don't know till your taught! Thanks for being a great teacher! Peace :)

    • LillyGrillzit profile imageAUTHOR

      Lori J Latimer 

      7 years ago from The River Valley, Arkansas

      Dear Lynda, Thank you for the read, and I am glad you found this useful. I have bigger guns, for the worst of the worst. Just don't show 'em around very often. :0)

      dallas93444 - Thank you. It is pleasant to be in an atmosphere where creative jucies can flow. I have a couple of hubs I am waiting to copyright before publishing. It is the way of the world...

      Sweetsusieg - good work, and you are helping a lot of people. I took a quick look at things that are familiar...because they are . I know copying is a form of flattery, but it is also punishable by fines, and jail time possibly. Just think of all the jurisdictions needing to make that Stimulus money work. Those who have gotten grants to fight cyber crime, are just itching to put their technology and tools to work...The Best to you!

    • Sweetsusieg profile image


      7 years ago from Michigan

      Thanks so much for this info! Some really great tools here, I'm glad you were able to get it out! I have a few letters to write yet... still finding those duplicate titles.. Thanks for the Kudos!!

      Keep on writing!

    • dallas93444 profile image

      Dallas W Thompson 

      7 years ago from Bakersfield, CA

      Glad you shared this information. It provides a tool to ensure Internet integrity. Thanks for sharing.

    • lmmartin profile image


      7 years ago from Alberta and Florida

      A truly excellent hub, Lilly, full of useful information. Thanks. Lynda


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)