In Little Ray & Shark Patch Things Up a boating family faces an apex predator, displayed at 50% of viewport width.
June 2019 by V. R. Duin


All eyes were on the frightening beast.
Nobody wanted to be its next feast.
It was drawing terribly near,
making the future less than clear.
(Little Ray & Shark Patch Things Up)

Online publishing predators include fraudulent agents, book promoters, editors and fly-by-the night publishing houses with overpriced publishing packages.

Beware of Book Marketing Services: Bona fide services read and screen books to determine potential for success. Profiteers accept vastly dissimilar books, which cannot be served by one-size-fits-all junk marketing.

Beware of publishing insiders. Understaffed and overworked, they seek inside players and move at a snail's pace. Innovative, electrifying and sales-worthy concepts come with known names. Superstars can sell any book.

Beware of sham agents. They tie up clients for a year, for a fee, but do nothing. The rate of placement is low. They get away with poor customer service and no connections, background or insights into publishing.

Beware of contributing editors and illustrators. By small print contract, they take ownership of any edits and art they add to original work. Publishing houses reject complications of most royalty splits with joint actors.

Beware of fake freelance jobs. Online resources requiring upfront bank account information may be hoaxes. Carefully research job postings. Every offer of professional assistance should be considered suspect.

Beware of pay-to-play publishing houses. They open with overpriced publishing packages, then move to a new scam or the same scam under a new name. They rarely have book selling expertise or distribution networks.

Beware of online magazines. Some models are rights grabs. With small payments, they take control of past, present and future earnings or divert rights to another predator. SFWA tracks bad actors in Writer Beware.

Beware of online clearing houses. Writer placement services may be click-bait agents for corrupt goods and services. The more a writer is willing to pay to find a publisher, the more solicitations are likely to be delivered.

Beware of writing contests. Were past winners from the same publishing house? Outside writers may contribute to awards for insiders. Who owns the story at the conclusion of the too-good-to-be-true competition?

Beware of contracts. Creative writing arrangements may infringe upon copyrights and trademarks. Unforeseen delays and problems may give rise to claims for expanded interests in contributors' share of the work.

Beware of hackers. Non-secure sites serve as springboards to larger sites. Phony reviews and contact links are made to look legitimate. They get passwords and banking or credit card numbers for financial destruction.

Beware of credit card fraud. Issuers are fighting it. Chip and fingerprint readers are replacing swiping. It is increasingly difficult to duplicate cards. Skimmed credit details too readily were cloned for use in bogus purposes.

Beware of social media. Fan pages and game apps can be toxic traps. A malicious link can redirect control of a writer's computer or browser to a malignant source. Victims may infect entire networks of connections.

Beware of shadowy companies. They hawk phony followers. They steal personal information to sell, endorse or misrepresent things or events. Small account value is diminished by fake armies behind celebrity-sized numbers.

Beware of fake profiles. Selling them is illegal, deceptive and unethical. Caught accounts are shut down. New laws are under consideration. Things may get worse for phony social media creators and their purchasers.

Beware of system abusers. Artificial intelligence is identifying and rewarding users for uncovering vulnerabilities. Systems are in place to detect spam or attempts to steal passwords. Human review directs content removal.

Beware of the Government. Specimens filed with the Library of Congress, United States Copyright office or the United States Patent and Trademark Office, as private work product, become public record information.

Beware of the Freedom of Information Act. Records in digital or print form from the U. S. Copyright Office and in bulk from the Library of Congress are widely, freely and publicly distributed to anyone by request.

Beware of fraudsters benefiting from government largess. Pirated goods offered for free pull traffic to sites. Advertising or membership fees further monetize this opportunism. Writers and publishers lose out on royalties.

Beware of rights' protection. Send printed specimens for filing, recording or documentation. Print versions are not as easily pirated as PDF files. Interactive audio books may offer the best theft protection.

Beware of pirated offerings. Online title searches uncover them. Creative writing competition takes on new meaning when writers charge for books offered by others for free. Independent writers rarely can fight this battle.

Beware of lack of recourse. Writers victimized by online pirates have few resources. The International Publishers Organization works with government agencies to lobby for effective anti-piracy laws for intellectual property.

Beware of online fraud and power concentrations. Efficiencies of algorithms, data and interconnectedness are upended by unscrupulous and reckless applications. Few predatory abuses face strong consequences.

Beware of security. Device manufacturers are helping in the background. Users are not alerted about or involved in some security upgrades. Companies encrypt and store back-up files on cloud drives to ensure access.

Beware of callers. Carriers are helping with screening technology. They can detect and block calls from area codes disguised to look like local calls or made in unusually high call volumes from an individual line.

Beware of real world security. Writers with Book Smarts and tech skills help spread awareness. To protect books in the market, interested parties also must lobby for proprietary hardware protections.

Beware of your ISP. These generally are not secure. There is no authority in charge of broadband security for consumers. Hardware offers the only protection against threats operating freely on this information free-for-all.

Beware of reboots. Applications, browsers and service providers forcefully interrupt operations and restart computer operating systems. This unwelcome disruption usually happens at night, while moonlighting writers are at work.