All eyes were on the frightening beast.
Nobody wanted to be its next feast.
It was drawing terribly near,
Making the future less than clear.
(“Little Ray & Shark Patch Things Up”)
Publishing predators, fraudulent agents and too-good-to-be-true creative writing competitions are some of the problems encountered by promising writers before and after publishing and while marketing their books.
Publishing predators who target promising writers: Fraudulent agents often tie writers up for a year, for a fee. They may have zero connections in the industry. Writer clients merely are being exploited. The rate of placement is so low that these “agents” need not do anything, but wait until the end of the year to report that the creative fiction or nonfiction work of the writer client cannot be placed. Beware of scammers who ask for bank account information. The promise to pay for a writer's work may be a hoax. Entire industries prey on writers who want to publish or sell their writing.
Writing contests also may be a rip off. Writers hear of award-winning work and believe their own work is equally worthy. Before entering into creative writing competitions, it is important to study past winners. Did they all come from the same publishing house? If so, outside writers merely will contribute to the awards in a writing contest destined for insiders. Writers must read the fine print. Who owns the story when the contest ends? Everyone must be alert for scams that unfairly transfer ownership of written work from promising writers to publishing predators.
Beware of the Government: Are promising writers' book sales getting whacked by pirated copies offered free of charge? No writer should ever submit PDF files of their work to the government. These are readily requested and received by anyone who asks for them. Send printed book specimens. These are not easily pirated, because there is a cost to copy and ship them. Thanks to Freedom of Information Act requests, anyone can receive records in digital or print form from the U. S. Copyright Office and in bulk from the Library of Congress. Requests cover all documents created since 1978, including recorded specimens of promising writers' books.
Copies of PDF files received upon request subsequently may be uploaded to websites, where downloads are available to users at no charge. Free goods generate a lot of traffic to websites. Popular sites are monetized through advertising, membership fees or other means. An online search for specific book titles should uncover the pirated offerings of promising writers. The writers who are victimized by these publishing predators have little recourse. They can only hope that users will be reluctant to download these pirated books, due to fears of malware, or that legitimate copies will be purchased after preview of the pirated PDF versions. Another hope is that mainstream publishers will take into account any readers' comments on these unethical sites when evaluating the potential for these books. In the meantime, of course, the book sales of promising writers may suffer, thanks to these online publishing predators.
Spammers and scammers and other cyber attackers: Bad actors lurk everywhere online. These bots and beings find readers, writers and educators on social media. They attach themselves to our websites. Hackers often use small, non-secure sites as a springboard to reach larger target sites, while leaving destruction in their wake. They direct traffic from our sites to those trumpeting their noxious purposes. They steal our identities. They attack entire networks with contagious, malicious code. Problems like these are becoming common. Social media may not be aware of attackers who locate promising writers within their networks with lures of fake pages, fake groups, fake news or fake profiles. These attacks may also come from the outside via email or cellular phone, as personal contact information is readily available online.
It is not necessary to steal our devices or our passwords to attack us. Denial-of-service attacks can originate with attacks on unsecured home appliances or services that post simple default passwords online for anyone to find. The government is beginning to look into online fraud. Only the government can sanction into law the strong legal consequences needed to deter the predators who lure innocent tech users into toxic disaster online from malware pushed or pulled onto unprotected surfer's devices. However, as online users, we must understand how online fraud works. This is the only way to avoid becoming unwitting agents used to spread online fraud through the networks attached to our businesses, stories, events, organizations and causes.