Cyberstalking

Good Essays
Topics: Abuse
Cheryl Vance
06/30/13
Cyberstalking

There are several stages to investigating a cyberstalking case. These stages assume that the identity of the cyberstalker is unknown. Even if the victim suspects an individual, investigators are advised to explore alternative possibilities and suspects. Although past research suggests that most stalkers have prior relationships with victims, this may not apply when the Internet is involved since stranger stalking is easier. Therefore, consider the possibility that the victim knows the stalker, but do not assume that this is the case:
1. Interview victim -determine what evidence the victim has of cyberstalking and obtain details about the victim that can be used to develop victimology. The aim of this initial information gathering stage is to confirm that a crime has been committed and to obtain enough information to move forward with the investigation.
2. Interview others -if there are other people involved, interview them to compile a more complete picture of what occurred.
3. Victimology and risk assessment -determine why an offender chose a specific victim and what risks the offender was willing to take to acquire that victim. The primary aim of this stage of the investigation is to understand the victim-offender relationship and determine where additional digital evidence might be found.
4. Search for additional digital evidence-use what is known about the victim and cyberstalker to perform a thorough search of the Internet. Victimology is key at this stage, guiding investigators to locations that might interest the victim or individuals like the victim. The cyberstalker initially observed or encountered the victim somewhere and investigators should try to determine where. Consider the possibility that the cyberstalker encountered the victim in the physical world. The aim of this stage is to gather more information about the crime, the victim and the cyberstalker.
5. Crime scene characteristics -examine crime

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cyberstalking Case Study In, People of the State of California (Plaintiff) v. George Samuel Bronk (Defendant), the defendant used various software, tools, and methods to commit the felonies for which he was charged. He initially used a computer with access to the Internet to take over the email accounts of individuals who he located using the popular social media website, Facebook. Mr. Bronk located his victims by searching random Facebook profiles that had personal email addresses available…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * So, cyberstalking. A quick look around the internet, and you can find the a range of definitions, somewhat similar, but none too encouraging. We've just got a couple here. One site defines it as an attack for revenge, control or just simple anger. Another defines it as the use of electronic means to harass people. * If anything, then cyberstalking is a more severe form of cyberbullying and thus it should well be noted, that cyberstalking, in itself has the ability to absolutely demolish self-esteem…

    • 551 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cyberstalking Jeff Worrell Waubonsee Community College Technology is getting more advanced in today’s world, but with it comes new problems and dangers; cyberstalking is no exception. Cyberstalking is a new way of stalking or harassing an individual that spawned from the use of the Internet (Cyberstalking, 2010). The Internet has given any user the ability to gain access to other peoples’ information, contact a person or group, or even damage another person’s computer or equipment.…

    • 1263 Words
    • 6 Pages
    Better Essays
  • Good Essays

    of other people online who do not even know the target. This is known as a 'digital pile-on.'[7] Cyberbullying vs. Cyberstalking Further information: Cyberstalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition when practiced by adults, the distinction in age groups sometimes refers to the abuse as cyberstalking or cyberharassment when perpetrated by adults toward adults.[8] Common tactics used by cyberstalkers are performed…

    • 864 Words
    • 4 Pages
    Good Essays
  • Best Essays

    an individual from being a victim of cybercrime. Therefore, the present paper is representation of the research which starts by focusing on general privacy of the social networking sites and moves to case studies in the field of identity theft, cyberstalking and child pornography in particular. Each case study tries to majorly address their connection with social networking, the general issues and the legal provisions. The final part of the research paper was drawn in form a advisory policy document…

    • 2368 Words
    • 10 Pages
    Best Essays
  • Better Essays

    Cyber Crime Research Paper

    • 1860 Words
    • 3 Pages

    Web. 04 Dec. 2014. . FBI, 25 Aug. 2010. Web. 03 Dec. 2014. <http://www.fbi.gov/about­us/investigate/cyber/computer­intrusions>. . Web. 05 Dec. 2014. . Wikimedia Foundation, 30 Nov. 2014. Web. 04 Dec. 2014. <http://en.wikipedia.org/wiki/Cyberstalking>. . Wikimedia Foundation, 12 Apr. 2014. Web. 05 Dec. 2014. <http://en.wikipedia.org/wiki/Identity_theft>.…

    • 1860 Words
    • 3 Pages
    Better Essays
  • Good Essays

    prevention tips. (n.d.). Retrieved October 18, 2013, from http://whpd.com/cyberfraud.htm Janssen, C. (Ed.). (2010). Cybercrime. Retrieved October 18, 2013, from http://www.techopedia.com/definition/2387/cybercrime Moore, A. A. (n.d.). What is cyberstalking. Retrieved October 18, 2013, from http://womensissues.about.com/od/violenceagainstwomen/f/Cyberstalking.htm Robinson, E. (2012, September 20). What is a computer hacker [Blog post]. Retrieved from http://blog.lifestore.aol.com/2012/09/20/what-is-a-hacker/…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 916 Words
    • 4 Pages

    Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes may not necessarily involve damage to physical property. They rather include the manipulation of confidential data and critical…

    • 916 Words
    • 4 Pages
    Good Essays
  • Good Essays

    called cyberbullying there must be a minor of both sides, or that at least the aggressions have been instigated by a minor against another minor. At the moment in which some adult is the aggressor, this offense is called cyberstalking. The laws that sanction cyberbullying or cyberstalking are implemented in the same way for any racial group, since this technological phenomenon affects individuals of all races in the same way. From an adult perspective, you can make the mistake of seeing it as innocent…

    • 238 Words
    • 1 Page
    Good Essays
  • Best Essays

    Abuse and New York

    • 476 Words
    • 2 Pages

    BIBLIOGRAPHY Bocij, P. (2004). Cyberstalking: harassment in the Internet age and how to protect your family. USA: Praeger Publisher. Bocij, P. (2004). Cyberstalking: harassment in the Internet age and how to protect your family. Westport, CT: Praeger Publisher. Burgess-Proctor, A., Patchin, J. W., & Hinduja, S. (2009). Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girl. Upper Saddle River, NJ: Prentice Hall. Colorosso, B. (2003). The Bully, the Bullied…

    • 476 Words
    • 2 Pages
    Best Essays