Logo
    Search

    Ep 34: For Your Eyes Only

    en-usMarch 19, 2019

    Podcast Summary

    • The Dark Reality of Revenge Porn and ExploitationRevenge porn is a serious issue, leading to humiliation and exploitation. Lack of strict laws and opportunistic individuals have contributed to the flourishing of websites like yougotposted.com. However, the law is catching up, and the arrest of individuals like Kevin Bollaert has brought attention to this growing problem.

      Revenge porn is a serious issue in the digital age where people post intimate images and videos of their ex-partners online without consent, leading to humiliation, cyberbullying, and exploitation. The lack of stringent laws around this unethical practice has made it easy for websites like yougotposted.com to flourish, where such content is uploaded for everyone's entertainment. Moreover, opportunistic people like Kevin Bollaert have exploited this vulnerability of people by creating sites like changemyreputation.com, where people have to pay to get their private images removed from the other site. However, the law is catching up with such criminals, and arrest of Kevin has brought much-needed attention to this growing problem.

    • The dangers of revenge porn and exploitation.Exploitation, cyberbullying, and harassment have serious consequences. Always be mindful of your actions and treat others with kindness and respect. Hold those who engage in unethical behavior accountable.

      The story highlights the dangers of revenge porn and unethical behavior. The consequences of posting revenge porn on the internet can be severe, leading to homelessness, loss of relationships, and even mental breakdowns. The story also sheds light on the traumatic experiences victims face. Additionally, the story highlights how some people with power and authority abuse their positions and use it to sexually harass and exploit others. The story serves as a reminder that exploitation, cyberbullying, and harassment can have serious consequences and those who engage in them must be held accountable. It is essential to be mindful of the consequences of our actions and treat others with kindness and respect.

    • Seeking Legal Recourse and Entrepreneurial Inspiration After Sexual AssaultTaking legal action against sexual assault can be empowering, and traumatic experiences can lead to unexpected career opportunities.

      The experience of sexual assault is traumatic and its effects long-lasting. Seeking legal action against perpetrators is a means to fight back against such atrocities. Hunter and his coworkers refused the initial settlement offered for their sexual harassment case, demanding a higher payout. They eventually received a settlement of $300,000 but the process was both mentally and emotionally tolling. Hunter's experience motivated him to become an entrepreneur but he needed direction in figuring out what kind of business to start. The story highlights the importance of seeking legal recourse for sexual harassment/assault and also shows that traumatic experiences can push individuals to explore new careers.

    • From Partying to Porn: The Rise of isanyoneup.comSometimes, success can come from questionable choices, but we must always respect the privacy of others and be mindful of financial and lifestyle decisions that can have negative consequences.

      Hunter was a young man with a lot of money, who spent it on drinking, partying, drugs, and women. He also tried his hand at DJing and got a lot of tattoos. When his money ran out, he started a website called isanyoneup.com, where people could anonymously post nude photos of their partners. The site became popular quickly. It shows that sometimes, good things can come from bad situations, but it's important to remember that it's not okay to share explicit photos of people without their consent. We should also be responsible with our money and avoid excessive partying that can lead to harmful habits.

    • The rise and fall of isanyoneup.comExploiting others' privacy for personal gain is unethical and can have serious consequences for both the victim and the perpetrator. Consent is crucial in any form of media distribution.

      The website isanyoneup.com became popular for posting unauthorized nude photos of people, including male band members' genitalia, resulting in a cult following. Hunter, the website owner, added links to people's Facebook profiles, leading to victims receiving creepy messages. While some people liked the attention, many felt violated and complained to Facebook, leading to Hunter being banned. Despite this, Hunter's unapologetic persona and response to hate mail gained him more fans. On TV shows, Hunter claimed anonymity and blamed victims for taking the pictures, saying it's 2011/2012 and everything's on the internet. The situation caused pain to victims and some had their pictures posted without their consent due to hacking.

    • The rise and fall of Hunter Moore, creator of a notorious revenge porn website.The pursuit of wealth and fame can have damaging consequences, and ethical considerations should always be a priority when leveraging technology for personal gain.

      Hunter Moore rose to fame by creating the revenge porn site isanyoneup.com. He was making $30,000 a month and had 40 to 70 million visitors to his site. However, his extravagant lifestyle and drug addiction led him to develop a god complex. He received a lot of backlash and attention, including campaigns from Anonymous and 4chan, who flooded his site with child porn and animal porn forcing him to look at graphic images constantly. It was too overwhelming for him and eventually led him to shut down his site after a year and a half. Although he became infamous and the most hated man on the internet, he claimed that he was giving people a lesson on how technology and privacy work in the modern era.

    • Proper Evidence Gathering Leads to Justice ServedVictims of hacking should report the crime to proper authorities and not blame themselves. Negative influences and high-risk lifestyles can lead individuals to wrongdoing.

      Charlotte Laws, a private investigator, compiled a list of evidence against Hunter Moore and sent it to the FBI. The FBI investigated and found that the hacker, Gary Jones, was hacking accounts and posting personal photos on Hunter's site. Hunter who offered Gary money was finally taken down by the FBI after amassing enough evidence against him. This shows that justice can be served if the evidence against a wrongdoer is properly gathered and presented. Victims of hacking should not blame themselves but report the crime to the proper authorities. It's also important to note that Hayes, who started isanyoneup.com, exerted a negative influence on his followers through his lifestyle choices of drugs and wild parties.

    • The Risks of Online Hacking and Nude Photo Exchanges for CelebritiesCelebrities must be cautious with their digital information, as hackers can access their private photos through email and cloning. These illegal activities can lead to severe consequences like imprisonment and ban from the internet.

      Weird and obscene incidents of online hacking and nude photo exchanges involving celebrities can occur. The hackers target celebrities' email addresses and hack their iCloud accounts by cloning the Apple's iCloud login page. The clone would save the username and password in clear text, allowing the hacker to gain unauthorized access to private photos and exchange them for those of other celebrities through Anon-IB. These online activities, like revenge porn and stolen nudes, show the importance of being cautious online and protecting one's digital information. As seen in Hunter's case, illegal online activities can lead to severe consequences, like being banned from the internet and facing imprisonment for identity theft and computer access.

    • Hackers Use Social Engineering Tactics To Steal Celebrities' Private PhotosUsers should be vigilant of phishing scams and use strong passwords to prevent hackers from gaining access to their iCloud accounts. Beware of suspicious emails claiming to be from Apple and never click on unknown links.

      Hackers can easily use social engineering tactics like phishing attacks to gain access to celebrities' iCloud accounts. They can then copy everything off those accounts using tools like ElcomSoft. Celebrities' private photos, including nudes, can be stolen and shared among hackers, which is a violation of their privacy. Some of the targeted individuals were under the age of 18 when they took these photos. These hackers likely did it for the thrill and to collect trophies. Users should be aware of phishing scams and use strong passwords to lessen the chances of their accounts being hacked. iCloud users should also be cautious of suspicious emails claiming to be from Apple or asking them to click on a link.

    • The Fappening- the Massive Celebrity Nude Picture Leak of 2014The Fappening, a massive leak of explicit celebrity photos, happened in 2014 due to a collector buying pictures. It quickly spread over the internet, with Jennifer Lawrence becoming the most popular victim. The morality of the leak is questioned.

      The Fappening, a massive leak of celebrity nude pictures, happened in 2014 due to a collector who spent weeks buying explicit pictures and created a big collection. The collector posted them on 4chan and called it The Fappening, which quickly spread all over Reddit, Facebook, Twitter, and the internet. Jennifer Lawrence became the poster child of this leak due to her popularity and the number of photos of her in it. The Fappening subreddit became the most quickly growing subreddit in Reddit's history with 100,000 subscribers in just twenty-four hours. While news outlets called it Celeb Gate, many people questioned the morality of keeping it up or even looking at it.

    • The Fappening and Reddit's Moral StandpointReddit faced backlash for hosting links to leaked celebrity photos despite not hosting them themselves. Despite their stance, they eventually had to ban the subreddit due to rule-breaking. It was a violation of privacy and choice for the victims.

      The leaked celebrity photos on Reddit's The Fappening were a result of users posting links to photos hosted on external sites. While Reddit did not host the photos, they faced media backlash and internal debates on how to handle the situation. Despite their stance on not being the moral police, Reddit eventually banned The Fappening due to the massive scale of rule-breaking by users. Even after the ban, more leaks continued to happen, and some celebrities denied the authenticity of the leaked photos. Jennifer Lawrence, who was a victim of the scandal, spoke to Vanity Fair about how it was not her choice to have her nude photos leaked, and it was a violation of her privacy and choice.

    • Lessons on Technology and Privacy from Jennifer Lawrence's Hacking IncidentBe cautious online, cover your devices when having private moments, and think before uploading personal content. Your privacy and security are at risk, and hackers can use phishing tactics to gain access to your information.

      The lesson learned from Jennifer Lawrence's hacking is that just having a nude photo of yourself on your phone that you never share is not safe and it can get leaked, imagine the worst-case scenario happening. It's better to not show your face or something. Make sure your laptop and phone cameras are covered when you're having sex because hackers have been known to record people unknowingly. FBI arrested five hackers involved in Celeb Gate who had no prior arrest records and used phishing e-mails to get into individual iCloud logins. Technology and privacy are better understood when we hear such stories. It's essential to be cautious online and think before uploading any personal content.

    • The Fight Against Revenge PornPosting sexual photos without someone's consent is illegal in many countries and states. Legislation is being updated, punishing offenders, and policies are changing on platforms such as Reddit. Victims of revenge porn now have better tools to fight back.

      Posting sexual photos without a person's consent is a criminal offense in many countries, and states in the US. Legislation around revenge porn is shaping up, and victims now have slightly better tools to help resolve it. Crazy exes should be aware that there are punishments for posting it. It'll take some time before it becomes general knowledge that it's illegal in many states to post revenge porn and people will think twice about posting it. Reddit and other image boards have also changed their policies to prohibit revenge porn or stolen porn. Suicides are happening after finding their sexual photos distributed without their consent, especially hard for LGBT people who have not come out yet.

    Recent Episodes from Darknet Diaries

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    137: Predator

    137: Predator
    A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Sexual Misconduct on Campus

    Sexual Misconduct on Campus

    The issue of sexual assault on campuses and how to best combat these incidents is a highly debated topic among legal professionals. How should these crimes be handled and what can colleges do to protect their students?

    In this episode of Planet Lex, host Daniel Rodriguez speaks with Northwestern Pritzker School of Law Professor of Law Deborah Tuerkheimer about campus sexual misconduct. Deborah shares that historically universities have not handled issues of sexual assault well and that the significance of the problem is still being assessed as we look at how institutions of higher education respond to these situations. She talks about the 2011 “Dear Colleague” letter issued by the U.S. Department of Education Office for Civil Rights on how campuses should handle sexual misconduct and provides insight into how the document represents a shift in the way the federal government approached the issue. Deborah explains what Title IX is and how it helped establish that sexual harassment can create a hostile environment. In addition to the civil and criminal systems, she discusses what campuses can do to help those affected by sexual misconduct and why disciplinary responsibilities fall squarely on campuses to ensure that affected students are able to continue their education. Deborah closes the interview with her perspective on what else the federal government can do to bring adequate attention to these issues and the impact that the “Dear Colleague” letter has had on our nation's campuses.

    Deborah Tuerkheimer joined the Northwestern Pritzker School of Law faculty in 2014 after serving as a professor of law at DePaul University since 2009. Professor Tuerkheimer received her undergraduate degree from Harvard College and her JD from Yale. She teaches and writes in the areas of criminal law, evidence, and feminist legal theory. Her book, “Flawed Convictions: ‘Shaken Baby Syndrome’ and the Inertia of Injustice,” was published by Oxford University Press in 2014. She is also a co-author of the casebook “Feminist Jurisprudence: Cases and Materials” and the author of numerous articles on rape and domestic violence. After clerking for Alaska Supreme Court Justice Jay Rabinowitz, she served for five years as an assistant district attorney in the New York County District Attorney's Office, where she specialized in domestic violence prosecution. Tuerkheimer was elected to the American Law Institute in 2015, an esteemed group of judges, lawyers, and legal scholars dedicated to the development of the law.

    Encore : How to STOP Cyberbullying and Intentional Harm //Barbara Coloroso

    Encore : How to STOP Cyberbullying and Intentional Harm //Barbara Coloroso

    For the past 49 years Barbara Coloroso has been speaking, educating and teaching on parenting, creating positive school climates, bullying, explaining nonviolent conflict resolution and more.  She has appeared on the BBC, Oprah and CNN. In this episode we discuss cyberbullying, it’s far reaching ramifications and what tools our kids need to have to combat this growing problem.

    (Content Warning: Sexual Assault) - Staying Safe While Activist-ing with Stephanie Zvan

    (Content Warning: Sexual Assault) - Staying Safe While Activist-ing with Stephanie Zvan

    We interview feminist writer, blogger, radio host, public speaker, and "jill of all trades" activist Stephanie Zvan about cyberbullying, feminism, harassment, trolling, "freeze peach" / free speech, platforming, and online activism, and finally, discussing how to be safer AND more effective as an advocate of civil rights.

    Follow Stephanie on Twitter @Szvan

    Read Stephanie's blog: https://the-orbit.net/almostdiamonds/

     

    The RESIST Podcast is hosted by @DanielleMuscato and produced by @erothco. Sign up for our newsletter at RESISTpodcast.com.

    Also make sure to follow us on Twitter at @RESISTpodcast and Like our Facebook Page at Facebook.com/RESISTpodcast.

    We would appreciate if you could support the show at Patreon.com/RESISTpodcast or via PayPal to paypal@RESISTpodcast.com

    Thank you for listening! #RESIST!

    Relief from Social Media Pressure with John Perritt

    Relief from Social Media Pressure with John Perritt

    On this episode of Flourish-Meant, host Tina Yeager invites guest John Perritt to discuss ways to relieve social media pressure. John emphasizes the importance of physical presence and in-person interaction for developing social skills and authentic relationships. Cyberbullying and the impact of social media on developing brains are also explored. The discussion also highlights the benefits of conversation and listening to young people, and practical tips are shared for engaging with social media in a healthy way. Additionally, John stresses the importance of discussing idolatry in a compassionate way with children, and filling our minds and hearts with God's truth to combat the lies of social media and our own hearts. A resource book is recommended, and listeners are directed to the organization's website for additional resources and a special offer from New Growth Press.

    John Perritt is an experienced student ministry professional with over 20 years of experience. He has witnessed technology's impact on the younger generation, from the early days of texting to the emergence of smartphone apps. Seeing firsthand how technology affects students, Perritt created a devotional to positively influence their relationship with technology and faith. Although research on the impact is not fully available, Perritt aims to share his experiences with the younger generation.

    Podcast Episode Summary: Healthy Social Engagement: Balancing Technology and In-Person Interaction

    • The importance of in-person interaction and its benefits
    • Cyberbullying and the concerns around children using smartphones and accessing social media at a young age 
    • Solutions to excessive online engagement and the recommendation of a book which promotes healthy online and in-person interaction
    • The importance of learning social cues and developing empathy and compassion through in-person interaction 
    • Conversation as a powerful tool for impacting students
    •  The concerning impact of screen time on students, including depression and anxiety
    • A devotion created for students in response to the impact of technology on them
    • Practical tips for engaging with social media and smartphones in a healthy way
    • The reality of idolatry in human nature and the importance of discussing this empathetically with children
    • The importance of filling our minds and hearts with God's word

    Connect with John Perritt at https://rym.org/ and get his new book at newgrowthpress.com.

    To book Tina as a speaker, connect with her life coaching services, and more, visit her website: https://tinayeager.com/

    Get inspired now and get Tina Yeager's newest release, Upcycled: Crafted for a Purpose! The book is available on Amazon, Bold Vision Books, or wherever books are sold. Visit Tina's website for craft videos and more at https://www.tinayeager.com/upcycled/

    Follow Tina on Amazon: https://www.amazon.com/Tina-Yeager-M....

    Upcycled: Crafted for a Purpose (Bold Vision site) Beautiful Warrior: Finding Victory Over the Lies Formed Against You (publisher site): https://www.newhopepublishers.com/sho...

    If you're a writer, subscribe to Inkspirations Online (devotional publication by writers for writers): https://www.inkspirationsonline.com/

    Manage stress and anxiety in 10 minutes a day with the course presented by 15 experts, Subdue Stress and Anxiety https://divineencouragement.onlinecou...

    Connect with Tina at: Facebook: https://www.facebook.com/tyeagerwriting/

    Linked In: https://www.linkedin.com/in/tinayeager/

    Instagram: https://www.instagram.com/tina.yeager.9/

    YouTube:    / tinayeager  

    Pinterest: https://www.pinterest.com/tyeagerwrites/

    Goodreads: https://www.goodreads.com/author/show...