Preview

The Cyber Manhunt

Better Essays
Open Document
Open Document
887 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Cyber Manhunt
The Cyber Manhunt
Cyber Manhunt, also known as Human Flesh Search or Internet Mass Hunting is primarily a Chinese Internet phenomenon of massive searching in which numerous Internet users participate to filter the search results and assists users in clarifying their search request. It literally means to uncover the true identity of a particular person with the connected efforts of all netizens. Because of the convenient and efficient nature of information sharing on the cyberspace, the Human Flesh Search is often used to acquire information usually difficult or impossible to find by other conventional means (such as library or Google). Such information, once available, can be rapidly distributed to hundreds of websites, making it an extremely powerful mass media. The purposes of human flesh search vary from providing technical/professional question&answer support to revealing private/classified information about specific individuals or organizations. Because personal knowledge or unofficial (sometimes illegal) access are frequently depended upon to acquire these information, the reliability and accuracy of such searches often vary. Netizens usually use Internet media such as blogs and forums to identify and expose information of individuals to public. It is based on massive human collaboration. The name refers both to the use of knowledge contributed by human beings through social networking, as well as the fact that the searches are usually dedicated to finding the identity of a human being who has committed some sort of offense or social breach online.

The origin of the term is disputed. One such theory is that the word was inspired by "Chicago typewriter" in the novel Ghost Blows Out the Light, which started a trend of describing manual inputting as "Human Flesh typewriter". A more accepted theory is that the term was coined by netizens on MOP, a popular Chinese BBS.

The first recognized Human Flesh Search dated back to March 2006, when netizens on Tianya

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In, People of the State of California (Plaintiff) v. George Samuel Bronk (Defendant), the defendant used various software, tools, and methods to commit the felonies for which he was charged. He initially used a computer with access to the Internet to take over the email accounts of individuals who he located using the popular social media website, Facebook. Mr. Bronk located his victims by searching random Facebook profiles that had personal email addresses available to the public. Once he had the email addresses he tried to access emails accounts, by attempting to reset the passwords for said email accounts, by guessing at the security questions. Once he was able to gain access to the emails accounts, he went back to the Facebook profiles and took over the Facebook profiles as well.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Tolson, Mike. “Why tracking predators online can hinge on ‘luck.’ ” Chron. Houston Chronicle, 2009. Web. 22 August 2010.…

    • 1379 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Investigative Programs, Cyber Investigations: Operation "Web Snare". (2005). Federal Bureau of Investigation Website. Retrieved November 12, 2005 from, www.fbi.gov/cyberinvest/websmare.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Computers are a wondrous invention. From their very infancy in World War II, they have enabled man to defeat his fellow man in cryptographic war, they have been used to sequence the human genome and so many previously impossible things. However, we are entering an age where computers and technology have become almost indistinguishable from our everyday lives in a myriad of forms like Facebook ,Snapchat, and Instagram, and we must, as a culture, make a decision on how far we are willing to let technology and those who wield it enter our lives. The Circle by Dave Eggers is a poignant warning of the possible dangers of technology and power gone rampant. The novel concerns an extremely influential internet search corporation known as The Circle whose de facto monopoly on internet searches and online advertising has granted them tremendous wealth and power over governments, companies and public opinion .…

    • 792 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Good Essays

    “More than half of all adult internet users have used a search engine to follow others’ footprints” (Pew / Internet, 2007)…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Alias Name

    • 1240 Words
    • 5 Pages

    SEARCHING for information about people in the web is one of the most common activities of internet users. Around 30…

    • 1240 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Holloway, Christopher. "Worldcrunch." Welcome To The Deep Web: The Internet 's Dark And Scary Underbelly. N.p., 17 Nov. 2012. Web. 21 Oct. 2013.…

    • 891 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Computers and telecommunication networks have become a substantial aspect of our society and subsequently our lives. This type of technology can be used to carry out unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. The Internet cuts all racial, social, gender, and religious…

    • 4210 Words
    • 17 Pages
    Better Essays
  • Better Essays

    Cyber Predators

    • 1385 Words
    • 6 Pages

    Imagine being a mother or father who is at home and suddenly the phone rings. It’s the police, they believe your son or daughter has been chatting with an internet predator. He/She went to meet him/her and was kidnapped. The police are tracking the suspect, but have no idea if their children is still alive. In today’s sick and twisted world these occurrences are becoming more and more frequent. Some parents and children don’t realize that with the power of the internet in millions of households, comes great responsibility. These websites have become a playground for cyber stalkers. Cyber predators can find easy prey on today’s internet, but with kids gaining more internet knowledge, computer security devices, and crime task units progress can start being made in stopping this ongoing problem.…

    • 1385 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Internet Safety

    • 1165 Words
    • 5 Pages

    When browsing on the internet, we rarely think about how the internet came to existence. We often go about our routine lives and don’t think about how the internet today has made it so convenient for people to get in touch with one another. This in turn has frequently led many people to having their identities stolen and also experienced being victims of online sexual predators. In this paper, we will discuss how with the evolution of the internet today, more people are able to get in touch with one another; therefore leading to the the harsh reality and safety precautions one can take when being online.…

    • 1165 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The internet has aided criminal activity by communicating with each other without having to be near, as well as fraud and identity theft. The rise of the Internet over the last decade has paralleled some of the greatest milestones in communications history. Along with such great strides in bringing the world together, the frightening aspect of accessing information and propaganda that tests the very…

    • 1750 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    "On the Internet, nobody knows you 're a dog" is a famous saying from The New Yorker. It illustrates the anonymity of the Internet. People can express their ideas freely through the Internet. However, it also brings some problems like rumors and network violence. Some experts put forward the idea of the real name-system which causes a heated debate among people. The South Korean government decided to implement the network real-name system in 2005. Instead of reducing the malicious slander, this system brings some bad side effects to the society.…

    • 1218 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Newsday, the most popular Social Network Sites like Facebook, LinkedIn and Twitter provide ‘Self-expression’ services to the members. People who familiar with technology and Internet mostly familiar with Social Network Sites too. There is an avatar to represent each member but user must input personal information into that avatar to identify them with avatar. Not only personal information of member that can be detected, the information while interaction is occurring also can be detected by specific software name ‘Web crawler’ which state by Ying Ding, Elin K. Jacob, James Caverlee, Michael Fried, and Zhixiong Zhang (2009). Profiling Social Network: Retrieved from D-lib Magazine website: http://www.dlib.org/dlib/march09/ding/03ding.html. That is where the personal information of the member flows on the internet.…

    • 5080 Words
    • 21 Pages
    Powerful Essays