Tuesday, November 10, 2009

Sue Scheff: CyberStalking and Internet Defamation Documentary - MUST SEE


For everyone and anyone that is reading this, you use the Internet. I recently watch the most compelling and disturbing documentary. I almost feel like Oprah when I say – you have to watch this! I have never been so moved to anger, rage, and other emotions that we are now confronted with because of monsters that lurk online.

My recent book, Google Bomb, is the tip of the iceberg after watching this film. The victims, and now crusaders, in this film contacted me after hearing about my book and my own experiences.

Many people that have read my book say they have nightmares if they read it before going to bed. I never really understood that. Until I watched this documentary and lived it through other’s lives. My story is horrible, what I endured, however since I was so enmeshed in surviving on a daily basis, I didn’t realize how traumatic it was.

I know many of you have limited time. Watch this 50 minute film in segments if you have to, but watch it.

The title is “Stalkers” however I would prefer to use a phrase that was recently introduced to me – “criminals with a keyboard.”

This film shares two stories with you. One with Graham Brown-Martin (pictured above) and his lovely wife, Wren as well as their toddler daughter and the other with a man, Chay, who in one weak moment had a one night stand that takes obsession to a new level. If there was ever a “Fatal Attraction” through the Internet, we have found it. However, unlike the Hollywood movie, Chay literally only had a one night stand, no strings attached. He never heard again from her until months later, and it would be the worse next years of his life.
Are you ready to watch?

Don’t miss a minute of it! Visit Digital Safety for more information.

Saturday, October 31, 2009

Sue Scheff: Google Bomb Book continues with fantastic reviews!


Conversations with Moms interviews our foreword author, Michael Fertik, CEO and Founder of ReputationDefender.

The response has been overwhelming to Google Bomb book and I am thrilled that the reviews just get better and better. Be sure to order your copy today.


Source: Conversations with Moms

By: Maria Melo

When I wrote about my review of the Google Bomb book, I was not surprised about all the emails and comments I received concerning online reputation. I felt like I had learned a lot from reading this book and was a little less naive about the potential threats online.

Soon after my review, I was contacted and asked if I wanted to speak with Michael Fertik, CEO of Reputation Defender. Of course I was intrigued and open to finding out more ways of how we can protect ourselves online.

I think my biggest concern online is keeping my children safe. I hear more and more about cyber-bullying and the damaging effects it has on the children being targeted. Kids can be cruel and the internet has become a weapon in spreading that cruelty. I like the way Michael described it best.

“In the past, kids passed notes in class to spread rumors and viciousness. Now they use the internet. The behavior has not changed, just the medium.”

Follow ReputationDefender on Twitter @RepDef
Follow Conversations with Moms on Twitter @ConversationsWM

Thursday, October 22, 2009

Sue Scheff: Google Bomb Interview with Conversations with Moms


By Maria Melo


If you haven’t read my review on the, “Google Bomb” book, be sure to read it. It is the untold story of the landmark internet case that won Sue Scheff $11.3 million for defamation of character. I was so amazed with what I read, that I just had to follow through with some questions.


Click here for my complete interview.

Tuesday, October 20, 2009

Sue Scheff: Another Fantastic Book Review for Google Bomb Book





When I first started being active on the internet, I was very naive to the Internet World. I’ve learned a lot in the past year and thought that I truly understood the power of the internet. Until I read, “Google™ Bomb”.


Lets just say that I now feel as though I lived in a cave. I was totally unaware of the true power and damage that the internet can do. I don’t know where I was in 2006 to not have heard of the landmark internet case that won Sue Scheff $11.3 million for defamation of character. The only thing I can think of is that I wasn’t active online and didn’t really pay attention to what happened in the internet world.


When I was asked to review this book, I was curious as to find out what could have happened to Sue to make her have won such a large lawsuit. I had never heard of the term Google™ Bomb and thought it would be an informative read. I HAD NO IDEA JUST HOW MUCH I WOULD LEARN.


I was happy to provide this review if only to spread the word of how vicious the internet could be and in hopes of getting the word out that there are simple things you can do to protect yourself.


Part 2 will be tomorrow.

Thursday, October 1, 2009

Sue Scheff: A Way Through raves about Google Bomb book!


Google Bomb by John W Dozier Jr. and Sue Scheff

Reviewed by Jane Balvanz

We all know the drill the flight attendant gives before the plane takes off. “Ladies and gentleman, please note the compartment above where the oxygen masks are stored. In case of an emergency, they will drop down. Please put your oxygen mask on first before assisting children or others.” We know why. If you can’t protect yourself first, you can’t help anyone else.

The Google Bomb book is a metaphoric oxygen mask. If we want to protect our kids from cyber bullying, we need to know what can happen to adults on the Internet. While it’s a wonderful place to communicate, conduct business, and access information, the Internet is also a virtual place with cyber land mines. You can’t navigate around them if you don’t know they exist.

A line from the book made me sit up and take notice: “Parents, if you cannot use and understand the technology your kids are using, then don’t allow them to use it. Period.” This wasn’t a call for parents to shut off their kids’ computers, cell phones, or ban them from technological advances. It was a call for parents to know as much as their children about technology, because what you don’t know about the Internet can hurt you….and your family.

This brings to mind one of my friends. She’s a successful business owner, financially astute, and her business is not Internet dependent. In fact, she’s so successful she doesn’t even have to advertise. She’s savvy, but she doesn’t know how to navigate on a computer let alone access the Internet. Her children know more about this technology than she does. They are six and seven.

Now to the matter of why the Google Bomb book exists. Sue Scheff, renowned and respected child and parent advocate and founder of Parents Universal Resource Experts (P.U.R.E.), became the target of unfathomable Internet defamation. She was hit by a Google Bomb. Because of false, defamatory material written about her on the Internet, she became a magnet for serious cyber stalkers and their followers. For a while, Sue’s life was not her own. Her story reads like the horrifying cyber nightmare you never want to experience and a “how to” in case you do.

Though reeling from cyber abuse, Sue refused to become a victim. She took measures to address the damage done. Lucky for us, John Dozier, Jr. and Sue chose to write this book. We benefit because Google Bomb teaches us ways to protect ourselves and our families from Internet abuse. One invaluable section, Top Ten Steps You Can Take to Protect Yourself Online, outlines how to take action immediately. The steps are preventative – think oxygen mask vs. domino effect. When your reputation is attacked online, the following can fall, one after the other: others’ trust in you, your job performance, your business, your area of expertise, your self-esteem, chances for advancement, and maybe your job. Your children may be teased or shunned because of it, and the result can be on beyond devastating. Just ask Sue.

In the end, Sue won an $11.3M lawsuit against her cyber stalker. The road was long and painful. The verdict was a landmark decision that changed the way we use the Internet. As you seek to guide and protect your children regarding Internet usage, seek to protect yourself as well. Put your own oxygen mask on first.

Tuesday, September 29, 2009

Sue Scheff: More praises for Google Bomb book

I am so overwhelmed at that fantastic reviews Google Bomb is receiving. Yesterday McClatchy-Tribune wrote a wonderful review:

Read it: Google Bomb' aims to protect you from information age trolls

I have received many emails and calls from people all over, singing the praises of Google Bomb. My last caller just told me she ordered 20 copies to share with business associates, as they are now experiencing the effect of a Google bomb from one disgruntled client.

Take cover early - learn how to protect your online image and your cyber resume today!

Sunday, September 27, 2009

Sue Scheff: Why people are praising Google Bomb book



· Who should purchase Google Bomb?

Every person with a name and reputation which they wish to protect should purchase this book. You don’t have to be a technological titan to understand the examples provided. The take-away knowledge provides you a fighting chance to protect, and when necessary, reclaim your reputation. My adage re family online safety is: “Invest in your family’s online safety, commensurate with the value of your family.” This book’s modest price is asymmetrical to the increased value you’ll experience in your reputation safety quotient.

· Why you should purchase Google Bomb

Google Bomb is road-map clear, no missed exits, nor wrong turns, no questionable advice. It is an arrow in your quiver, so that you may defend yourself and/or prepare yourself should you have the unfortunate experience of receiving the vile ill-will of another via the social media environment in which we collectively exist – you do have a fighting chance.

· How Google Bomb touched me

Only infrequently does a book cause a reader to experience a personal visceral reaction; for me, it’s happened only once before. Google Bomb, the telling of Sue Scheff’s personal story in the recovery of her good name and reputation, is such a book, it moved me, and it will move you. Allow me to explain.

Those who know me well will have immediate understanding why a book which charts the Herculean efforts required to reclaim your good name, reputation and professional stature following the actions of a few to destroy, such resonated with me. You see, once you’ve traversed that road of false accusations, you never wish to replicate the journey again, and you’d wish it upon no one.

When it’s happening it’s surreal and unbelievable. Once the realization you aren’t dreaming hits home, you are either overwhelmed and capitulate, in effect self-declared road-kill or you take inventory of all your resources and deduce your good name and honorable reputation are the only remnants of your life worth protecting. You then take these remnants and use them to form the foundation of your reclamation efforts. Even if your first steps may feel a bit like Don Quixote tilting at windmills, persevere, what journey ever started off with every experience preordained?

I appreciated the description of the pivotal moment when Sue described the last straw, the straw which caused her to stand up and say, “Enough already.” I had complete visualization of her reaction when the miscreants who had been attacking her persona and her company, began attacking her children. I had no doubt her “mother bear” instinct to fight and protect her offspring was fully awake and it was game-on!

Unfortunately, bad things do happen to good people. You strive, perhaps seemingly altruistically to bring goodness to this world and awaken one day to find yourself surrounded by vile and unconscionable accusations. Your mindset describes the event as “stupefying,” you are now seemingly being punished for your good works. Google Bomb describes such an experience, Sue’s experience.

· What to do and how to do it

John Dozier’s insightful discussion of events, throughout the book, is clear and concise – the reader can easily understand the, “why” behind each of Sue’s actions. I found myself rereading and noting the legal and technical strategy employed as Sue’s reputation was reclaimed. I was nodding my head with great satisfaction as those wishing ill will upon Sue and her family were identified, held accountable and brought before the courts where they were ultimately held responsible and duly punished.

· Applicability for businesses and intellectual property

John’s extrapolation of his methodologies to the realm of a small, medium, or large company’s reputation and intellectual property protection is spot-on. My own book “Secrets Stolen, Fortunes Lost” was stolen within 60 days of publication from my publisher, and then shared via peer-to-peer networks (see my article Secrets Stolen, No Just the Intellectual Property which describes the experience). Plainly spoken, if you have intellectual property, “Have a strategy!” to protect it.

· Reputation Defense

Highlighting the good works of Michael Fertik’s Reputation Defender, was personally appreciated, as it reoriented my compass with respect to his firm – I’ll be re-engaging the company to learn more about their capabilities. My first encounter with Reputation Defender can only be described as “going sideways” and I have no doubt it was an anomalous event – I look forward to learning more from Michael or his staff, as Sue’s experiences described in Google Bomb, clearly show them to be effective.

· Google Bomb’s call to action


I agree with and wish to associate myself with the call-to-action contained in the book. We are all responsible for keeping our shared online community safe. When self-policing and self-control fail, then we do require meaningful laws availed to law enforcement and prosecutors. Laws having backbone and are easily understood and are flexible enough to anticipate evolution of technology are required. In essence our current situation is analogous to having a population center of millions without a “time-out” corner.

In my opinion, we need alignment of state and federal statutes which will hold accountable those engaging in cyber stalking, invasion of our privacy, personal impersonation and character defamation. In the United States, well meaning legislators are acting individually and from the optic of their constituent states – we need federal action. Furthermore, restraining orders need to have appropriate meat attached to their bones, with a need to integrate 21st century technologies – in the physical world 100 feet is measurable, in the virtual world, geographic borders are obscured – lets bring technological audit trails, access controlled environments and filtering into play.

It is no small task to fill the international voids which provide haven for both domestic and international criminal or malevolent individuals to operate with impunity, but instead of describing the difficulty, let’s get started. I’m all in! If we don’t all step up and contribute, then Sue’s story will be the first of many more to come.

· My personal thank you

In closing, I’d like Sue to know I’ve great personal empathy for the angst which she and her family experienced and I commend her for her display of personal courage and fortitude, from her decision to stand up and not take it any more, all the way through the sharing of her story so that others may learn from her experiences. For John, your work speaks for itself, nicely done sir.

Thank you Sue also for your good works both individually and through your Parents Universal Resource Experts (PURE); it is clear you are one of the good people, and many families no doubt are grateful beyond their ability to articulate for the assistance you provided. Thank you John for your clear explanations of the legal strategy and steps one can take to protect oneself, you’ve empowered many.

--
Christopher Burgess
Christopher is the senior security advisor within a Fortune 100 company. He is also the co-author of Secrets Stolen, Fortunes Lost, Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
http://www.secretsstolen.com/
Twitter: @burgessct
This reviewer paid for this book