Internet Vulnerabilities & Criminal Activities
description
Transcript of Internet Vulnerabilities & Criminal Activities
4.2 – 10/3/2011Social Networking,
Cyberbullying, & Cyberstalking
What should the jurisdiction be?
“Unrestrained behavior resulting from a lessening or loss of inhibitions or a disregard of cultural constraints.”
Don’t forget that your profile and MySpace forums are public spaces.
People aren't always who they say they are. Harassment, hate speech and inappropriate
content should be reported. Don't post anything that would embarrass
you later. Don't say you're over 18 if you're not. Don't
say you're younger than 18 if you're not.
Never share your password with anyone. Adjust your privacy settings to match your level
of comfort, and review them often. Be cautious about posting and sharing personal
information… Report users and content that violate our
Statement of Rights and Responsibilities. Block and report anyone that sends you
unwanted or inappropriate communications. Remember that while Facebook has always been
based on a real name culture, and using fake names is a violation of our Statement of Rights and Responsibilities, people are not always who they say they are.
Account Hijacking Spam Phishing Malware Child Exploitation Burglary Cyberbullying Cyberstalking
Too Much Information!! Personal Information
• Real name• Address• Phone number• Family members
Work Information• Employer• Job position
Personal Schedule• Work schedule• Vacations
Open Source information “Evidence Hub” Information about criminal acts Evidence of actions by known
criminals Finding suspects MySpace Predator Caught by Code -
http://www.wired.com/science/discoveries/news/2006/10/71948?currentPage=all
“The use of e-mail, instant messaging, chat rooms, pagers, cell
phones, or other forms of information technology to
deliberately harass, threaten, or intimidate someone.”
Used more & more by children & teens
May be anonymous Bully may be unknown to victim Can reach a larger audience Invades the victim’s home
• No retreat from bully
Text messages Pictures or videos of someone being
bullied Private pictures made public Cell phone calls E-mail Chat rooms Instant messaging Websites Online threats Creating fake profiles
Computer fraud Sexual harassment / cyber harassment Child pornography Physical harm / suicide Some states have cyberbullying laws
• http://www.cyberbullyalert.com/blog/category/cyber-bullying-law/
Linda Sanchez (D, CA) – has twice (08 & 09) introduced Megan Meyer Cyberbullying Prevention Act
“A pattern of repeated and unwanted attention, harassment, contact, or any other
course of conduct directed at a specific person that would cause a reasonable person to feel fear done via electronic
means.”
Control of victim’s behavior
Revenge
Resume a previous relationship
All states have laws regarding stalking• California 1st in 1990
Six states have cyberstalking laws• Illinois, Louisiana, Mississippi, North
Carolina, Rhode Island, and Washington Other states use stalking laws and
harassment laws Connecticut stalking laws -
http://www.ncvc.org/SRC/main.aspx?dbID=DB_Connecticut195
Zona and colleagues (1993) – 3 types• Simple Obsessional• Erotomania• Love Obsessional
(Mullen, Pathe, Purcell, and Stuart, 1999) – 5 types based on motivation & context• The Rejected• The Intimacy Seeker• The Incompetent• The Resentful• The Predatory
A prior relationship exists between the victim and the stalker which includes the following:• Acquaintance, neighbor, customer, professional
relationship, dating, and lover The stalking behavior begins after
either:• The relationship has gone “sour”• The offending individual perceives some
mistreatment The stalker begins a campaign either to
rectify the schism, or to seek some type of retribution
Based on the Diagnostic Statistical Manual, 4th ed. The central theme of the delusion is that another
person is in love with the individual The delusion often concerns idealized romantic love
and spiritual union rather than sexual attraction — “a perfect match”
The object of affection is usually of a higher status and can be a complete stranger
Efforts to contact the victim are common, but the stalker may keep the delusion a secret
Males, seen most often in forensic samples, come into contact with the law during misguided pursuits to “rescue” the individual from some imagined danger.
Females are seen most often in clinical samples
Similar to the erotomanic individuals:• The victim is almost always known through the
media.• The delusion that the victim loves them may also be
held The erotomanic delusion is but one of several
delusions and psychiatric symptoms — this individual has a primary psychiatric diagnosis
These individuals may be obsessed in their love, without having the belief that the target is in love with them
A campaign is begun to make his/her existence known to the victim
* As a result of a relationship dissolution (i.e. estrangement, disruptions, break-ups) from an ex-partner (but inclusive of a parent, friend, or work associate) this type of stalker can be observed desiring a mixture of reconciliation and revenge.
This individual often experiences feelings of loss, frustration, anger, jealousy, malevolence, and depression.
The Simple Obsessional subtype given previously closely approximates this type of stalker.
These stalkers pursue an intimate relationship with an individual perceived as their true love, but their attentions are not wanted by the object of their affection.
The type of stalkers who fall into this category often have a delusional disorder (i.e. erotomania). Those who represent "intimacy seekers" may suffer from other disorders (i.e. schizophrenia, mania) or hold morbid infatuations.
Erotomania and Love Obsessional best represent this category.
These intellectually limited and socially incompetent individuals desire intimacy, but the object of their affection does not reciprocate these feelings.
They often lack sufficient skills in courting rituals.
They may also display a sense of entitlement: believing they deserve a partner, but lack the ability or desire to engage in subdued, preliminary interpersonal relations.
Another aspect of these stalkers is that they may have had previous stalking victims.
Unlike the intimacy seekers, those in the incompetent category do not view the victim as having unique qualities; they are not infatuated with the victim -- only attracted, and do not assert that the affection is mutual.
The goal of this stalker is to frighten and distress the victim.
These stalkers may also experience feelings of injustice and desire revenge.
The power and control that comes from stalking a victim gives these stalkers a great deal of enjoyment.
The stalker often strives to learn more about the victim.
The stalker may even mentally rehearse a plan to attack the victim.
Most of these stalkers are diagnosed paraphilias and, compared to the previous four categories, they were more likely to have histories of sexual offense convictions.
May be in different physical location than the victim
Stalker may use multiple online identities
The victim may not know the stalker Stalker engages in different types of
activities Anonymity
• Stalker may be embolden• Stalker may leave sparse identity clues
E-mail stalking – direct communication via e-mail
Internet stalking – global communications via the Internet
Computer stalking – taking control of victim’s computer
SMS – short message service & text messaging
Control of victim and victim’s behavior
Damaging victim’s reputation by online means
Can be more serious than physical stalking• Information can be more widespread• Information can be found online for a long
time