Preview

Cyberstalking Case Study Paper

Satisfactory Essays
Open Document
Open Document
455 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyberstalking Case Study Paper
Cyberstalking Case Study

In, People of the State of California (Plaintiff) v. George Samuel Bronk (Defendant), the defendant used various software, tools, and methods to commit the felonies for which he was charged. He initially used a computer with access to the Internet to take over the email accounts of individuals who he located using the popular social media website, Facebook. Mr. Bronk located his victims by searching random Facebook profiles that had personal email addresses available to the public. Once he had the email addresses he tried to access emails accounts, by attempting to reset the passwords for said email accounts, by guessing at the security questions. Once he was able to gain access to the emails accounts, he went back to the Facebook profiles and took over the Facebook profiles as well.
Mr. Bronk utilized various online email service providers such as Gmail, Hotmail, and Yahoo. The victims each had respective accounts with these email service providers which were overtaken by Mr. Bronk, using the methods described above. Mr. Bronk also used Microsoft Office Outlook in the commission of his crimes.
Besides the cyberstalking, investigators also found evidence of extortion and pornography on Mr. Bronk 's computer hard disk storage drives. Along with these counts, Mr. Bronk is also charged with the possession of child pornography. The defendant used a computer and access to the Internet to gain unauthorized access to an online chatting forum in which blackmailed a victim into sending him nude photographs and videos of herself. Mr. Bronk also had on his computer storage devices child pornographic materials such as photographs and videos. The defendant gained access to this material with the use of his computer and a connection to the Internet.
Investigators were notified when a victim reported that her email and Facebook accounts had been hijacked and inappropriate messages sent to her entire contact list, in Connecticut. When an Ex-parte



References: University of Phoenix. (2010). Bronk Complaint. Retrieved from University of Phoenix, BCC 402 Retrieved from http://oag.ca.gov/system/files/attachments/press_release/n2026_bronk_complaint.pdf. University of Phoenix. (2010). Bronk Complaint. Retrieved from University of Phoenix, BCC 402 Retrieved from http://oag.ca.gov/system/files/attachments/press_release/n2026_bronk_declaration)of)support_of_arrest_warrant.pdf.

You May Also Find These Documents Helpful

  • Good Essays

    In 2000, the Arlington Police Department received information stating that Earnest Leon Voyles had exchanged emails that contained sexual content with a fifteen year old girl from London, England. According to this informant the fifteen year old girl, “Amy Chang”, had been solicited for sex by Voyles and had arranged to meet with her in London to engage in a sexual relationship. Sergeant James Crouch of the Arlington Police Department was unsuccessful in contacting “Amy Chang” to verify the arrangement but was not successful, however, he was successful in verifying that Voyles was working as a teacher at a junior high located in Arlington, Texas.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A Virginia man, James Hobgood, cyberstalked an Arkansas woman after the woman broke off a brief romantic relationship. He stalked her through email, Facebook messages, and text messages demanding that the woman apologize for the breakup (Baker, 2017). At this point, the woman could have gone to law enforcement if she had the proper documentation to stop any future harassment, and she could have blocked the stalker from email, Facebook, and text messages. After Hobgood could not get the woman to communicate with him, he created social media accounts that stated the victim was an escort and an exotic dancer. He also emailed the woman's family and place of employment (Baker, 2017). Hobgood was sentenced to one year in prison for his crime. The…

    • 193 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Between Jacques Saelman and William Wuerch, plaintiffs, and Dennis Wayne Hill and Sylvia Ann Hill, defendants [2004] O.J. No. 2122 [2004] O.T.C. 440 20 R.P.R. (4th) 118 2004 CanLII 9176 131 A.C.W.S. (3d) 367 Court File No. 13526/00…

    • 9633 Words
    • 39 Pages
    Powerful Essays
  • Better Essays

    Millman, Sevilla & Tarlow, (1999), California Criminal Defense Practice, Ch. 140, Challenges to Crimes, 140.02, Ch. 141, Conspiracy, Solicitation, and Attempt, 141.20; Ch. 142, Crimes Against the Person, 142.01…

    • 682 Words
    • 3 Pages
    Better Essays
  • Good Essays

    After it has been determined that an email crime has been committed involving an email, the first step is to access the victims computer and recover the evidence. Using the victims email client, you must find and copy any potential evidence. It is important to copy, print, or forward the email to another email address as a backup. After an email messages is copied, you will then need to find the email header, after the email header is found, open the email header and copy and paste…

    • 1122 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    This article is about the interviewing of young victims of cyber abuse by law enforcement and legal personnel. I found the article to be somewhat brief, but it is valuable as it is dense with information on the psychological side of “how” and “why” children and adolescents fall victim to internet predators. I liked this particular article because it differed from many other articles in that it explained the importance of how an interview should be conducted, and in explaining that importance it helps the reader grasp a better understanding of the psychological impact of the victims. I believe the psychological awareness and facts…

    • 1379 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Annotated Bibliography

    • 943 Words
    • 3 Pages

    Facebook has more than five hundred million users and fifty percent are logged on every day, because of this it makes it a large target for online hackers. Many applications on social networking sites can access a user’s personal information. An increasing number of Facebook users are adding “friends” on their Facebook that they do not know and because they accept the friend request, it is not abuse since the friend request was accepted. Spambots send informal messages to users which contain a link which once opened can contain any type of computer virus. Cyber attackers are also using natural disasters as a way to gain credit card information. They will start a group titled “Help Haiti Rebuild” or something similar with a link to insert credit card information to send money to those affected. Some hackers also take part in “phishing” which is a way to gain login names and passwords by presenting a fake login page. an excessive amount of spam was sent by a using account from which the passwords were phished and post a link to the malware.…

    • 943 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Dombrowski, S. C., Gischlar, K. L., and Durst, T. “Safeguarding Young People from Cyber Pornography and Cyber Sexual Predation: A Major Dilemma of the Internet” Child Abuse Review 16, no.3 (2007): 153-70 https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=240947…

    • 1367 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Cyberbully Essay

    • 539 Words
    • 2 Pages

    Cyberbullies should be prosecuted for what they say or do on social media. Physiologist Eden Foster stated “In order for behavior to be defined as cyberbullying it must be repeated, hostile, and sever with the intent to embarrass threaten or harass.” “Twenty percent of youth ages 11-18 have been a victim of cyberbullying” says the Cyberbullying Research Center. This needs to stop. If Cyberbullying is against the law, less people would be victimized.…

    • 539 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Roberson, C., Wallace, H., & Stuckey, G. B. (n.d.). The Charging Funtion. In Procedures in the Justice System (10th ed., p. 122).…

    • 1037 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Syndrome-Based Defenses

    • 1710 Words
    • 7 Pages

    Schmalleger, F., Hall, D. E., Dolatowski, J. J. (2010) Criminal Law Today. Upper Saddle River: Pearson Education, Inc.…

    • 1710 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays