Hello! I am the proprietor of the blogs Torsade Literary Space and The Cartoon House.
This family history site has been created as a resource, comprising years of research done by my mother, Marilyn Foster, in collecting family tree information, chiefly for the Barker line of Southern Illinois.
As Historical Societies and Public Libraries must devote limited funds and staffing hours to cataloging, organizing, and displaying such information, we believe the best solution is to blog the collection, so that those with a connection to the families, to the Illinois, Kentucky, Indiana, Ohio region that encompasses the confluence of the Mississippi and Ohio rivers, or anyone curious about the personal side of American history, the stories of ordinary people, can discover this information and view these images.
Welcome, and thanks for stopping by!
A Word on Safety
Obviously, this is the first concern, when we undertake to share our pictures, newspaper clippings, etc. What about internet predators?
The internet belongs to us, its users. The service providers exist, because we exist and use their products. So, if we had a users’ bill of rights, one article ought to be that we can have fun, we can show off our interests; we can be entertained; we can participate (in games, quizzes) without the harassment or paranoia of having to suppose the whole thing is a setup to steal our information.
Part of the problem, is that the problem is so difficult to quantify. One set of numbers gives the damage at 16 billion dollars stolen, and 15 million identities. But, not long ago a story came out that 700 million users’ information was included in a “data dump“, posted this past December. This represents, as authorities believe, an amalgamation of several breaches…so, are hackers making a thousand dollars a hit, or something less impressive, to the tune of about twenty or thirty dollars a hit?
Two trends account for much of the theft of information, and the money in these cases is made “in good time” through false representation of constituencies, both of the sort created to influence politics in election fraud, and the “followers” a web-based enterprise faking its popularity to boost its borrowing potential, may purchase from a hacker.
So what about your information? Well, for one thing, the times haven’t changed that much. In the 1950s, it would have been little trouble for someone to learn who lived at a particular address, or pick up maiden names and family tidbits from obituaries, and other news. More than that, as genealogists know, all sorts of personal information was published—and we’re glad of it—in those newspaper columns of old times, where citizens’ visits and club activities, family illnesses and engagements were itemized.
People can find these things out about you today, from any number of public sources. We don’t need a new mental affliction, in which we worry about telling our physical address, or even our email address, making evils in our mind with a runaway imagination, that only adds to the world’s mistrustfulness and division. We use these things every day, and must, to do business. It is the responsibility of banks, ISPs, social media, et al., to make their customers and users secure, not that of the users to block (by some means) doorways these entities hold open. Most major hacks have been attacks on servers.
Still, history buffs and genealogists, and writers looking for the milieu in which their stories will take place, and all others with good and innocent purposes (which are still the majority of people on the internet), be careful. Don’t use family names, pet names, children’s names, favorite songs, favorite movies, favorite colors, food, vacation sites, anything else you’ve already told the world about, to make passwords, or to answer security questions.