Tuesday, July 26, 2011

Internet Law: The Ethics of Fair and Honest Reporting-When dealing with suits the best place to start is the legal department






















By Renee Foster,The Spectrum Groups' Director of Media and Public Relations,

Start-up companies, Professionals, Large Companies, and Individuals need attorney law groups that have a proven track record of success.

Before you publish, promote, or market your Brand (identity), You need to know or have an idea of what constitutes a proven case, if ever faced with infringement or defamation. Knowing what constitutes "admissible evidence", when protecting your creations, in addition to, proving a case (making sure sure you can avoid your solid, credible, truthful evidence from being dismissed as "hearsay" with credible expert testimony, and witnesses)..... is key.

Class action suits are an option. Maybe.Maybe Not. Sometimes you have to go after corporations, employees, and individuals for their contributions.




Remember. Admissible evidence is key. Getting the right organization and attorneys to represent you is also key.




Businesses and individuals should require an Internet lawyer who is recognized for experience, expertise and client service handling handling in virtually all aspects of Internet law issues like:

Complex Litigation
Internet Defamation
Trade Secret Law
Internet Law
Trademark Law
Patent Law
Cyber-squatting Law
Non-Compete Law


When you start using a service on the Internet, or doing business make sure you read the fine print of the "Terms of the Service Agreement" and if its fair, then use the service. Be sure to have the corporate office number, address, and know who the legal counsel is that represents those in which you are doing business with and.....last but not least, don't let the statutes of limitations pass you by. And be careful......Interpretation of the law is tricky!!!!

Dozier: defamation lawyer


According to Dozier, "It's a shame some people mislead the public by appearing to be an objective, fair and accurate custodian of information, but fail so miserably in the ethics of fair and honest reporting I wonder how long it will take before they get their database right."

Lastly, Get this application to screenshot all your activities and place on an external device to avoid remote access to your system, or removal, deletion, of your files. Anna Sims‑Phillips recently expressed 'that this world is filled with Sharks and you've got to "roll with the sharks" to survive'.

Dozier represents cases like these:

A prominent online business was targeted on a weblog through internet defamation, and the posts escalated to the point that death threats were being made and a map to the company headquarters was posted. Google had indexed the blog in the first position whenever someone searched for our client.

A small business was defamed by a competitor launching a website and going so far as to post a portion of the owner's credit report.

A world-renowned professional in a controversial subject matter found that a website was publishing false claims about him, damaging his reputation and credibility. Since he was often an expert commentator on TV, this was a significant problem that had to be addressed.
A former employee launched a website attacking our international client.

An ex-girlfriend published false information about her boyfriend's company, which was indexed by search engines.

Industry bulletin board posts from a former customer claimed that our client was running a "scam" operation.

A consumer protection "review" site seemed to always return extremely negative and detailed reviews of any company not advertising on the site.

An unhappy customer launched an extensive website critical of our client, including false and misleading claims and altered documents.

A nationally recognized speaker was defamed on a series of "review sites" surreptitiously run and controlled by competitors and indexed high on the major search engines.

A prominent University professor was told of a site with his name and photograph falsely claiming the he was a convicted pedophile.

A long established and upstanding franchise company was attacked on scam reporting sites by a disgruntled former franchise holder.

A foreign government listed our client on a government agency website selling unregistered securities when the investment/venture fund was not required to register under the law.

A joint venture fell apart, and a disturbed participant used the web to attack our client by launching a derogatory replica of our client's site and advertising it through a pay per click campaign.

A dissatisfied distributor of our client's products used a copy of the client's e-mail customer list to send out defamatory emails to all of the client's customers.

Our European client was defamed on a website chat board in the US despite clear liability under UK law for the publication of such information accessible by its UK customers.

A former employee initiated a "spam" campaign involving the mailing of millions of emails purporting to be from our client, resulting in a deluge of irate responses and threats as well as ISP blacklisting.

Competing companies started posting links to state consumer affairs offices trying to get an investigation undertaken of our client.

Dissatisfied customers of our client decide to publish defamatory statements that quickly show up on the first page of organic Google results.


Our client's business was initially referred to by a popular blogger as a "scam", an inaccurate description requiring immediate attention since the results were showing up at the top of Google's results.


A business was told it would have to pay a very significant amount of money for a defamatory posting to be removed from a rip off reporting site.

A fast growing web company had a disgruntled employee go directly to several federal agencies, potentially resulting in the initiation of an investigation.

An internet company was sued for a declaratory judgment on the West Coast resulting from our client's complaints about defamatory posts and threats of legal action before we were hired.

The major business bureau issued a fraud warning on our client, threatening the existence of its business, without having conducted adequate due diligence and appropriate analysis to fully understand the nature of the business.


An unknown party was posting a photograph and defamatory statements about our client, a well known internet businessman, leading to embarrassing questions and inconvenience.

Our client, a leading international physician, was faced with a disgruntled former patient undertaking a web based campaign to impugn his reputation.

The President of an online marketing company was in the "cross hairs" of a former client. The former client launched a site dedicated to attacking our client's business and posted links on a major scam website to his personal site, demanding money to take it down.

A high profile lawyer had been under investigation in the late 1990s in connection with fraudulent transactions. No charges were ever brought, but the original newspaper articles (with inaccuracies) remained on the web for all the world to see, highly indexed in Google results.

Our client, a former high profile US government lawyer, launched a new web business supporting our troops in Iraq and a new “scam review site” was launched falsely complaining about his product before any product was distributed or sold.

An internationally renowned musician hired us because a website owned by lawyers representing food industry personnel had false posts about his restaurant’s practices.

A plastic surgeon was the victim of false allegations relating to a nose job and related extortion demands.

A prominent medical industry forum and website was used by an employee of a major medical company to falsely allege improprieties by our client who was a fellow employee.

A top athlete in a niche sport was the subject of false and damaging statements on the industry forum.

A syndicated radio and television personality was under attack by an obsessed blogger turned website owner who was launching new websites dedicated to attacking our client with false and malicious accusations.

A realtor selling a real estate tycoon’s condominium project was targeted and attacked online by a disgruntled purchaser.

Look for this identity when considering a defamation suit:









Sources
Legal Group

Legal Counsel Library

The Importance of Persistence

Admissible Evidence

Amazon Property-Class Action Suit?

**DISCLAIMER: The material on this blog is produced/reproduced for enjoyment, review and information purposes only. The images contained within this site, with the exception of those represented to be originally produced by THE SPECTRUM GROUP or Michelle Weston, are believed to be in the public domain. They have been obtained either from public domain libraries on the Internet or contributed to THE SPECTRUM GROUP by users of this service. THE SPECTRUM GROUP does not sell or license any of these public domain images.

Monday, July 25, 2011

The Spectrum Group - Creating Content, Brands, and Products for the Masses























Our articles, products and services are spreading via web, print, and through other mediums. Look out for the new catalogs as well.
We at the Spectrum Group want to thank the followers on the new site(s), fan clubs, meet-ups etc..........and let you know that the new content/product launch is 56 days away!!!!.......
WE are shocked at all the positive feedback received. Especially at the meet-ups and product demonstrations.

Renee Foster has set up twenty sites dedicated to work of Cara Blue, Michelle Weston, Mike, Jack, Lina, Ms. McCall and the whole crew. And remember.....our initial product demonstrations and meet-ups are by appointments/referrals only. Thanks for the referrals. We are excited about all that's coming, along with brand new content, Spectrum products, brands etc.......

We are excited as the launch is approaching and stay tuned.....keep following us.....the ways in which you can check out our activities are endless......

Remember, our team is dedicated to keeping you all in the loop with the new content that's coming.

Great News!!!! Just got loaded with new servers, laptops, etc...so we'll be able to respond to the massive loads of mail especially on the OSSG site. OSSG is moving units, rapidly!!!! Street teams promoting on a grass-roots level.

H-E-L-L-O :-)

Also, thanks to our volunteers who's application of the "ole' school method" of communication that we have implemented over and over again. After all......You can't block what you don't know exists.....:-]


It has been test proven for centuries...........

Blessings to all the supporters

**DISCLAIMER: The material on this blog is produced/reproduced for enjoyment, review and information purposes only. The images contained within this site, with the exception of those represented to be originally produced by THE SPECTRUM GROUP or Michelle Weston, are believed to be in the public domain. They have been obtained either from public domain libraries on the Internet or contributed to THE SPECTRUM GROUP by users of this service. THE SPECTRUM GROUP does not sell or license any of these public domain images.

Friday, July 15, 2011

Due Diligence: Chain of Command

The most important words from my mother are:

"Follow the Chain of Command"







































































































































Due Diligence: Chain of Command*Slideshow is the creative work of Michelle Weston
*The headshot/executive images belong to their respective Copyright owners. Source of Images: Google Images


**DISCLAIMER: The material on this blog is produced/reproduced for enjoyment, review and information purposes only. The images contained within this site, with the exception of those represented to be originally produced by THE SPECTRUM GROUP or Michelle Weston, are believed to be in the public domain. They have been obtained either from public domain libraries on the Internet or contributed to THE SPECTRUM GROUP by users of this service. THE SPECTRUM GROUP does not sell or license any of these public domain images.

Chain of Command

Due Diligence: Chain of Command




**DISCLAIMER: The material on this blog is produced/reproduced for enjoyment, review and information purposes only. The images contained within this site, with the exception of those represented to be originally produced by THE SPECTRUM GROUP or Michelle Weston, are believed to be in the public domain. They have been obtained either from public domain libraries on the Internet or contributed to THE SPECTRUM GROUP by users of this service. THE SPECTRUM GROUP does not sell or license any of these public domain images.

Thursday, July 14, 2011

Can Content be blocked by Attacks, Competition, Government, or large Corporations?

Have you ever wondered why only certain companies control what we publish on the net? Have you ever wondered why there are limited gleams of spotlight on the competition? Is the Internet truly fair game or a monopoly? Please read the Source links below.

Jester' ex-military hacker takes the distributed out of DDOS attacks

11 January 2010

A politically-motivated hacker has apparently developed a multi-thread, thin-client denial of service attack application that effectively allows him to launch a distributed denial of service (DDOS) attack on a website from a single linux server.

Whilst single point denial of service software has been available in the hacker domain for some time, its usage has been restricted to relatively high-powered computers with T1 or better upload speeds, Infosecurity notes. According to online reports, however, a patriotic Islamic hacker — with possible military connections — and with the moniker of `Jester' on Twitter has been creating denial of service attacks on a number of sites he associates with al-Qaeda and Jihadist terrorists.

What is interesting about the attack vectors used is that the attacks are reportedly being made through the Anonine.com Swedish IP anonymiser service, which offers users high levels of anonymity in return for a modest monthly payment.

Unlike many other anonymiser services, Anonine does not impose IP traffic limitations, which appears to allow the Jester the ability to open up multiple IP sessions across a single internet connection.

According to Richard Steinon, a senior analyst with IT Harvest, the hacker has been documenting his attacks against a number of sites including www.alemarah.info, www.radicalislam.org, islamicpoint.net, www.almaghrib.org, www.as-ansar.com, www.islamicnetwork.com, www.islamicawakening.com, and www.ansarnet.info, since the start of the year.

Last Thursday, Steinon said that the Jester has posted a message that the Presidential website of Iran (www.president.ir) was going to be unavailable for the next 40 minutes, due to the country's oppressive Islamic regime.

"I approached The Jester through (direct messaging on Twitter) and provided my email address. I wanted to understand his/her motivations and intentions. These are still not completely clear but this post sums it up — the Jester Tweets; the Jester is taking on radical Islam through the web," he said in an online report.

Steinon also got a response via email from the Jester:

Hi again Richard,

Forgive me if I may sound vague on any of the following, as you can probably understand I need to protect my own identity for the moment.

I am an ex-soldier with a rather famous unit, country purposely not specified. I was involved with supporting Special Forces, I have served in (and around) Afghanistan amongst other places. Since `leaving' the governments payroll, it has occurred to me that the bad-guys are in fact starting to utilise the web more and more as a recruitment, communication, and propaganda medium.

I have been and continue to develop methods and tools to disrupt, mis-inform and obstruct this kind of terrorist activity. Kinda like taking them down from the inside, and using my weapon of choice. The method I have used to take-down the sites mentioned on twitter is rather special, it's only downfall right now is that it is obviously only temporary disruption. But I can however take down and put back their sites at will. The attack is like a DDOS attack, except without the first.

There is nothing 'distributed' about this. It is possible with very low bandwidth and a single low-spec linux machine. I am still refining the tool, but if you check right now — www.alemarah.info is in fact temporarily down, until I decide to bring it back.

According to the Jester, he is not defacing websites, a practice he denounces as mere graffiti, but wants to demonstrate a denial of service attack system he claims works over layer 7 of the internet and which runs from a linux server.



Sources:

Source 1

Source 2

**DISCLAIMER: The material on this blog is produced/reproduced for enjoyment, review and information purposes only. The images contained within this site, with the exception of those represented to be originally produced by THE SPECTRUM GROUP or Michelle Weston, are believed to be in the public domain. They have been obtained either from public domain libraries on the Internet or contributed to THE SPECTRUM GROUP by users of this service. THE SPECTRUM GROUP does not sell or license any of these public domain images.

Monday, July 11, 2011

Some Content Created for CLIENT EMMY Television/Radio Show "Due Process"

**DISCLAIMER: The material on this blog is produced/reproduced for enjoyment, review and information purposes only. The images contained within this site, with the exception of those represented to be originally produced by THE SPECTRUM GROUP or Michelle Weston, are believed to be in the public domain. They have been obtained either from public domain libraries on the Internet or contributed to THE SPECTRUM GROUP by users of this service. THE SPECTRUM GROUP does not sell or license any of these public domain images.

Blog Archive