Preview

Cyberstalking

Good Essays
Open Document
Open Document
908 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyberstalking
Cheryl Vance
06/30/13
Cyberstalking

There are several stages to investigating a cyberstalking case. These stages assume that the identity of the cyberstalker is unknown. Even if the victim suspects an individual, investigators are advised to explore alternative possibilities and suspects. Although past research suggests that most stalkers have prior relationships with victims, this may not apply when the Internet is involved since stranger stalking is easier. Therefore, consider the possibility that the victim knows the stalker, but do not assume that this is the case:
1. Interview victim -determine what evidence the victim has of cyberstalking and obtain details about the victim that can be used to develop victimology. The aim of this initial information gathering stage is to confirm that a crime has been committed and to obtain enough information to move forward with the investigation.
2. Interview others -if there are other people involved, interview them to compile a more complete picture of what occurred.
3. Victimology and risk assessment -determine why an offender chose a specific victim and what risks the offender was willing to take to acquire that victim. The primary aim of this stage of the investigation is to understand the victim-offender relationship and determine where additional digital evidence might be found.
4. Search for additional digital evidence-use what is known about the victim and cyberstalker to perform a thorough search of the Internet. Victimology is key at this stage, guiding investigators to locations that might interest the victim or individuals like the victim. The cyberstalker initially observed or encountered the victim somewhere and investigators should try to determine where. Consider the possibility that the cyberstalker encountered the victim in the physical world. The aim of this stage is to gather more information about the crime, the victim and the cyberstalker.
5. Crime scene characteristics -examine crime

You May Also Find These Documents Helpful

  • Better Essays

    3. Get contact information for any potential witnesses or anyone that has more information that can help the case.…

    • 1454 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 349 Words
    • 1 Page

    A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    When investigator Peter L. Lockhart Jr., follows the basic steps in a cybercrime investigation, the evidence will be admissible in a court of law. Obtaining the evidence…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Develop incident response procedures Develop and write down how to respond to incidents. Investigate incidents Responding to incidents and fulfilling all requirements as outlined in the response procedures. Protect collected evidence Collect, store, and keep a chain of custody for any/all evidence collected during the investigation…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This article is about the interviewing of young victims of cyber abuse by law enforcement and legal personnel. I found the article to be somewhat brief, but it is valuable as it is dense with information on the psychological side of “how” and “why” children and adolescents fall victim to internet predators. I liked this particular article because it differed from many other articles in that it explained the importance of how an interview should be conducted, and in explaining that importance it helps the reader grasp a better understanding of the psychological impact of the victims. I believe the psychological awareness and facts…

    • 1379 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    3. After interviewing the victim of a crime and two witnesses, and examining the crime scene and the physical evidence, you use all of this information as a basis for developing a unifying and internally consistent explanation of the event. You have: C…

    • 2005 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The work with victims enabled the participants to witness the trauma and devastating impacts of the abhorrent crimes, which helped to provide a deeper understanding into the victims’ experiences, as Participant 1 stated, “The work with victims is really helpful, because you can see, if they are bewildered,…

    • 1761 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Investigators should establish an area that is sizeable enough to likely contain all relevant physical evidence that may be present. It is easier for investigators to condense the size of a scene at a later point than to discover that sensitive evidence outside the scene has been damaged or destroyed by other responders, media or onlookers. In addition, potential paths of perpetrator entry/exit are identified.…

    • 1117 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Stalking Research Paper

    • 753 Words
    • 4 Pages

    An intimate stalker may want the victim to accept some kind of reconciliation between the two, and if the victim refuses he/she may threat the victim. Stalking has its levels of severity. Some stalkers may not stalked the victim on a daily basis while others may on an extreme level. Stalking can be done through emails, texts, phone calls, social media, letters, and so on. Cyberstalking can be going through the victim's personal documents such as emails and photos, tracking where the victim's location, or taking…

    • 753 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Process of the Crj Process

    • 1113 Words
    • 5 Pages

    The first step, investigation and arrest, is very important. Since there is already a crime that has been commented, getting as much evidence at the scene of the crime is critical. At the crime scene is also where the brainstorming begins for the police officers and investigators. An arrest warrant can be granted by a judge and in that warrant it provides, “the legal basis for an apprehension by the police.” (Schmalleger, 2011, p.18) “A warrant is, a writ issued by a judicial officer to perform a specified act and affording the officer protection from damages if he or she performs it.” (Schmalleger, 2011, p.18) Arrest is a serious step in the criminal justice process because no police officer wants to arrest the wrong individual. During the arrest and before the questioning the defendants are advised of their constitutional rights. These rights are known as Miranda Rights. Miranda Rights are a constitutional requirement, it protects the arrestee, and it also protects law enforcement and the prosecution from throwing out any evidence in the trial. After the arrest, suspects are placed in booking. Booking is described as, “A law enforcement or correctional administrative process officially recording an…

    • 1113 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The social and psychological into of an offender should be provided (for instance age, personality and race)…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    * So, cyberstalking. A quick look around the internet, and you can find the a range of definitions, somewhat similar, but none too encouraging.…

    • 551 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Collecting evidence is an essential factor to the world of criminology. The evidence can determine whether the person is guilty or not guilty. The matter of handling evidence correctly becomes a priority to anyone who is working in the case.…

    • 725 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Problem Statement

    • 317 Words
    • 2 Pages

    When victims of cybercrime seek aid from the courts, they expect to be compensated financially and that they would be treated with respect and that they will get help to resolve their problem (vision statement). The scale of cybercriminal activity represents a considerable challenge to law enforcement agencies and the total cost of cybercrime to society is significant. A recent report suggests that victims lose around $290 billion each year worldwide as a result of cybercrime, making it more profitable than the global trade in marijuana, cocaine and heroin combined. This type of crime happens to everyone and it is not set on just one type of victim. There is an estimate of about 20% of people that had to deal with this kind of crime. The impact cybercrime has on its victims causes guilt, anger, cheated, helpless, and fearful or worried. All these emotions have made victims not to trust anything or anyone. Cybercrime occurs at any point in time during a duration of opening a website that people believe to be safe. Even large businesses have had problems with cyber activity and has cost a lot of money, which hurts no matter who the victim is. Cybercrime occurs just about everywhere and the Internet is definitely a gateway for computers to be used as bait (issue statement). To better protect yourself from becoming a victim, computer forensics specialists are one of the best lines of defense. While one will always be careful searching the Internet, cyber attacks can be tracked if it is detected early and brought to computer forensics specialists. By providing individuals with a software updates, having them install a firewall to defend the computer from problems, install anti-virus software and to update it regularly, and just be careful what gets downloaded into the computer. Furthermore, just be aware of emails from unknown senders, do not open an email that is not familiar (solution statement).…

    • 317 Words
    • 2 Pages
    Satisfactory Essays

Related Topics