Cyberstalking

Cyberstalking is divers as stalking via technology, such every bit the use of hidden webcams, GPS devices, and SpyWare to another's beliefs (Sheridan & Grant, 2007).

From: Psychopathy and Criminal Behavior , 2022

Online assailment and romantic relationships in boyhood

Chelsea Olson , Amy Bellmore , in Child and Adolescent Online Risk Exposure, 2021

Definitions and qualities

Cyberstalking, the extension of offline stalking, is the behavior of stalking someone using electronic communication devices and platforms ( Parsons-Pollard & Moriarty, 2009). Cyberstalking cannot be an isolated event; it is the intentional and unwanted, repeated intrusion, over time, of a victim's life in a way that is perceived as threatening, often resulting in fearfulness (Caulk & Jones, 2011; Spitzberg & Hoobler, 2002; Ybarra, Langhinrichsen-Rohling, & Mitchell, 2017). A perpetrator may use computers or cell phones to cyberstalk a victim via the Internet, electronic mail, instant messaging, text messaging, or over social network sites. A perpetrator may use online technologies or platforms to gain personal data on a target in gild to further stalk them (surveillance behaviors), or they may use technology to endeavour repeated communication with the target (intrusive pursuit behaviors), sometimes with the intent to initiate a relationship (hyperintimacy) (Adam, 2002). Examples include monitoring online profiles to define a target'southward activities or location, installing GPS or malware on a target's devices, or repeatedly calling or texting a target.

Cyberstalking is like to cyberbullying in that it is an intentional, aggressive behavior that is repeated. However, the behaviors that plant stalking, which are meant to intrude on some other's life, are fundamentally unlike from the behaviors considered cyberbullying. While a target or victim of cyberstalking may feel a perpetrator has power over them, this is not a necessary component in the definition of cyberstalking as it is for cyberbullying. Cyberstalking often involves potential, current, or previous romantic partners (Lyndon, Bonds-Raacke, & Cratty, 2011), which is not often the case in cyberbullying. Revenge porn or doxing may cooccur with stalking. Some perpetrators use doxing methods to "trick" third-parties online to stem a target (Adam, 2002). For example, a perpetrator may pose equally a target and mail the target'southward personal information, such as a phone number, and enquire tertiary-party individuals to reach out to them. Much existing enquiry on cyberstalking has utilized adult populations, particularly college students (east.g., Caulk & Jones, 2011); the report of cyberstalking in adolescence is gaining research attention as awareness of its prevalence and significance becomes known. The most common way to study cyberstalking is by asking participants to indicate if they have engaged in sure cyberstalking behaviors. This makes it difficult to assess verbal prevalence rates and makes information technology difficult to compare beyond studies. Among adolescents, a contempo Pew Research Center study constitute that 21% of teens reported that they had experienced the "constant asking of where they are, what they are doing, who they are with, by someone other than a parent" (Anderson, 2018). Ybarra et al. (2017) constitute that 35% of adolescents reported engaging in at to the lowest degree i of half dozen cyberstalking behaviors, with the charge per unit dropping to sixteen% for at to the lowest degree two behaviors. Behaviors that could exist categorized every bit hyperintimacy or intrusive pursuit were most mutual, while a sophisticated surveillance behavior—downloading a GPS tracking organisation on a target's device—was least common (Ybarra et al., 2017).

Stalking and cyberstalking cause great emotional stress to victims. Emotions reported include fear, frustration, and helplessness; victims may distrust others and feel paranoia; as well, victims report insomnia, anxiety, posttraumatic stress disorder, and depression (Marcum, Higgins, & Ricketts, 2014; Spitzberg & Hoobler, 2002). Some other common consequence of stalking is the changes that victims make to their lives: they report changing jobs, schools, or hobbies (Spitzberg & Hoobler, 2002).

Read total chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780128174999000065

Cyberstalking and Bullying

Pavica Sheldon , ... James M. Honeycutt , in The Dark Side of Social Media, 2019

Abstract

Cyberstalking is a serious predatory behavior that arrives from the evolutionary need for control in the pursuit of resource and reputation. Originally, stalking involved behavioral invasion and referred to nonelectronic means of intrusion (e.m., physical surveillance, mailing letters). Stalking is related to a phenomenon referred to as obsessive relational intrusion (ORI), which is designed for intimacy development. ORI is an unwanted desire for intimacy through repetitive invasion of a person's sense of physical or symbolic privacy. The affiliate concludes with social learning theory applications in which many people are both in the part of bullies and targets. For example, children who are exposed to domestic violence in their homes are significantly more probable to swell others than those who are not exposed to domestic violence.

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780128159170000034

Understanding the People on the Scene

Littlejohn Shinder , Michael Cross , in Scene of the Cybercrime (Second Edition), 2008

Cybercriminals Are Never Violent

Because the Cyberspace is more a virtual than a physical medium, information technology seems logical to assume that even if cybercrime is existent law-breaking, information technology isn't violent crime. After all, it'south the ability to commit their crimes from a altitude that attracts many criminals to the Net in the first place.

Information technology'south true that a big percentage of reported cybercrimes are frauds, thefts, and cases of unauthorized access. Nevertheless, it is interesting to notation that the most frequently reported cybercrime in many reporting sites such every bit the Cybersnitch database (www.cybersnitch.internet) is child pornography, which is generally classified as a violent or potentially vehement crime for two reasons: the harm done to the children who are used to brand the photographs, and the potential of the material to incite pedophiles to human activity out their fantasies with real children. Hacker intrusions are the second most frequently reported crime type; the third is electronic stalking, which can also exist considered a vehement crime because it terrorizes the victim, and cyberstalkers take often been known to progress to really stalking their victims in real life.

Some people might debate that child porn and cyberstalking aren't in themselves physically fierce crimes, but information technology would exist difficult to make such a claim of the predators who use the Internet to detect vulnerable people they tin can lure into a meeting to rape, assail, or kill them. In addition to these violent offenders who unremarkably act alone, the terrorists who use the Internet to raise coin, programme their activities, recruit new members, and communicate with one another are violent criminals of the most dangerous sort.

On the Scene

Cybercriminals Posing Equally Potential Victims

The case of one cybercriminal inspired New Jersey to prefer legislation making it illegal "via electronic or any other ways, to lure or entice another person to meet or appear at any place, with a purpose to commit a criminal offense against any person." In 2002, Jonathan Gilberti posed online equally a woman with a rape fantasy in a chat room. Posing every bit Trish Barteck (his in-law), he provided her proper name, address, physical clarification, and other information to others online, inviting men to come to her business firm and rape her. When one homo arrived at her house and leered at her from his SUV, Barteck called the law and the subsequent investigation revealed Gilberti's role. Gilberti pleaded guilty to 3 counts of attempted sexual set on for this incident and others involving a different woman, but considering in that location was no law directly dealing with this type of law-breaking and future cases could be difficult to try, New Jersey approved the new law in 2005, which is available to view at www.njleg.state.nj.us/2004/Bills/PL05/1_.pdf.

Cybercriminals, like criminals in general, span a continuum that reaches from the kid whose marvel causes him or her to try to hack into someone's network just to encounter if it tin exist washed, with no intent to do damage, all the fashion up to those who employ the Internet every bit a means to cause someone concrete or emotional impairment. This realization leads us to our last misconception.

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9781597492768000030

Psychopathy: Cybercrime and cyber abuse

Evita March , in Psychopathy and Criminal Beliefs, 2022

Psychopathy and cyberstalking

In add-on to cyberbullying and trolling, psychopathy has also been related to the cyber abuse beliefs of cyberstalking. Cyberstalking is defined every bit stalking via technology, such every bit the use of subconscious webcams, GPS devices, and SpyWare to another'due south behavior ( Sheridan & Grant, 2007). Smoker and March (2017) explored the utility of psychopathy to predict intimate partner cyberstalking, which refers to cyberstalking beliefs toward current, erstwhile, or potential intimate partners. A full sample of 689 participants (70% women; Thouage   =   26, SD   = 10.21) completed a measure of psychopathy (the Short Dark Triad scale) and the Intimate Partner Cyberstalking Scale (IPCS-calibration; Smoker & March, 2017). Psychopathy was found to exist a significant positive predictor of intimate partner cyberstalking. Smoker and March (2017) explained that individuals with high psychopathy frequently engage in psychological game-playing in intimate relationships, and cyberstalking provides an opportunity for these individuals to participate in such romantic game-playing. March, Litten, Sullivan, and Ward (2020) explored the utility of primary psychopathy and secondary psychopathy to predict perpetration of intimate partner cyberstalking, and constitute only secondary psychopathy was a significant predictor. The utility of secondary psychopathy to predict intimate partner cyberstalking suggests impulsivity and poor cocky-control are central characteristics in this beliefs, and besides hints at the possible addictiveness of cyberstalking (March et al., 2020).

Contrary to the results of Smoker and March (2017), and March et al. (2020), Kircaburun, Jonason, and Griffiths (2018b) did not find psychopathy to predict cyberstalking. However, this could be attributed to the authors not directly measuring intimate partner cyberstalking (only cyberstalking in general), and the mensurate of psychopathy. To measure out psychopathy Smoker and March (2017) used the Short Nighttime Triad calibration, and March et al. (2020) used the Hare Self-Report Psychopathy Calibration 4 (SRP-4; Paulhus, Neumann, Hare, Williams, and Hemphill, 2017); both established, validated measures of psychopathy. Comparatively, Kircaburun et al. (2018b) assessed psychopathy with the Muddy Dozen, which has previously been criticized for comparatively lower validity (Jones & Paulhus, 2014).

Strong (2019) explored Facebook surveillance, defined equally when Facebook users look at their friends Facebook "profiles" in an attempt to collect information, in a mode that is not intended to benefit the target (i.e., the user whose contour is being surveyed). Stiff (2019) differentiated Facebook surveillance from typical Facebook use past noting it is "deliberate, covert, and targeted" (p. 63), and hypothesized that given individuals with high psychopathy dislike feelings of doubtfulness (Sabouri et al., 2016), they may be motivated to reduce such discomfort past engaging in a behavior that reduces it (i.e., cyberstalking). To assess the relationship between trait psychopathy and Facebook surveillance, 259 (150 women; Mage   =   20.49, SD   = xix.16) participants recruited via Prolific.ac completed a measure of psychopathy (the Short Nighttime Triad scale) and a measure out of Facebook surveillance. A factor analysis of the Facebook surveillance mensurate revealed 2 factors that were labeled "Facebook tracking" (e.g., I like to "stalk" some people's Facebook profiles) and "Facebook investigating" (e.1000., I take waited for a specific person to post on Facebook so I can read what they have written). Results showed a significant direct effect of psychopathy on Facebook tracking, but not for Facebook investigating. Strong (2019) posited that as Facebook tracking is more recreational in nature, individuals with high levels of psychopathy may enjoy engaging in this beliefs to satisfy their voyeuristic tendencies and need for power and command.

Read total chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780128114193000157

Conclusion

Michelle F. Wright , Lawrence B. Schiamberg , in Child and Adolescent Online Risk Exposure, 2021

The chapters in this book represent a broad range of specific online risks, including problematic internet use, contact take a chance behaviors, cyberstalking, cyberbullying and victimization, online hate, online exploitation, negative online interactions, digital media use, and digital corruption inside romantic relationships. This terminal chapter provides recommendations for the field of online risks and an argument for more established policies and intervention efforts. The intention of the chapter is to provide an argument for developing policies and intervention efforts, as well every bit a phone call for new directions in the field. Ultimately, the chapter attempts to bring attention to gaps while making recommendations for intervention, gild, and research. This affiliate is organized in the following manner:

1.

Summary of the chapters included in this edited book

2.

Cursory overview of the trends in the literature based on the capacity included in this volume

3.

Recommendations and new directions on online risks

4.

Concluding statement

Read full chapter

URL:

https://www.sciencedirect.com/science/commodity/pii/B978012817499900020X

Understanding E-mail and Internet Crimes

Littlejohn Shinder , Michael Cross , in Scene of the Cybercrime (Second Edition), 2008

Understanding Electronic mail Headers

There's more to managing information security than dealing with boundary devices and various types of logs. Electronic mail can open up the doors for all kinds of attacks and infections in an organisation. Besides making certain to install and utilize antivirus (AV) software that inspects all email payloads (and hopefully blocks all potential sources of such attacks), it's also necessary for users and administrators to bargain with unsolicited due east-mail (also called spam) or with e-mail-based denial-of-service (DoS) attacks (so-chosen mail bombs). To deal properly with spam and e-mail-based DoS attacks, it's admittedly essential to empathise how to read eastward-mail headers. Such noesis will not merely permit administrators and investigators to make up one's mind at to the lowest degree a putative (if not the actual) source for the attack or spam, but it will also aid them to ascertain a strategy for dealing with such beliefs.

The ability to runway due east-mail messages is important in many different types of cybercrime cases. It is not unusual for criminals to apply email in the following ways:

To harass victims (cyberstalking)

To ship extortion demands or threats

To contact potential victims (pedophiles, serial rapists)

To solicit "marks" for con games (Nigerian scam, pyramid schemes)

To coax people to visit Web sites and provide personal information that can exist used for identity theft and other purposes (phishing)

To communicate with accomplices

In all of these situations and others, e-mail service may be 1 (or the just) clue to the criminal'due south identity and may become evidence at trial. Unless the criminal is kind enough to sign the message with a full (and authentic) name, address, and telephone number, the only fashion to determine where a message originated is to examine the message "headers." Due east-post more often than not goes through a number of unlike computers on the mode from the sender to the intended recipient. Header information is added to the message at each machine along the way, until information technology reaches its destination. (The workstation on which the recipient reads the mail generally doesn't add together header info.) It is important for investigators to know what information can—and can't—be discerned from e-mail headers and to understand that headers can be spoofed (forged).

Breaking down and understanding e-postal service headers requires some cognition of how to recognize and decode the fields in those headers. This level of structure is well documented and is primarily divers in Request for Comments (RFC) 822, which documents the layout and structure of SMTP bulletin header fields. Although there are more than fields than the ones we discuss here, Table 9.1 lists the well-nigh important fields every bit well as all the fields you'll need to check to effort to trace messages back to their origins and to place the route they took from their putative original sender to reach the recipient'south email server.

Tabular array nine.1. Important RFC 822 Email Header Fields

Field Name Explanation
Source/Sender Header Fields
From Identifies email sender, usually by name and email address
Sender Identifies bodily sender of east-mail (may differ from the From field in some email systems)
Reply-to E-mail address to which replies should be sent
Return-path Path (address) back to sender
Received Except when users reside on the same server, known as a message transfer agent, or MTA, every e-mail goes through at least one intermediary server as it's routed from sender to receiver. Each such intermediary appears on its own Received line.
Resent-xxx Applies to re-sent messages, for From, Sender, and Reply-to fields
Destination Header Fields
To Identifies name and/or email address for recipient
Cc Secondary message recipients
Bcc Bullheaded carbon-copy message recipients. (Message is delivered to all Bcc designees, but no Bcc designee information is included in the header itself.)
Resent-30 Applies to re-sent letters for To, Cc, and Bcc fields
Appointment Headers
Date Date and time original message was sent
Resent-date Appointment and time re-sent message was sent
Optional Headers
Field of study Topic for message
Message-ID Unique message identifier (handled past MTA from originating system); besides supplied for re-sent messages
In-reply-to Identifies bulletin being replied to
References Identifies other letters to which this message applies
Keywords Keywords to help sort and organize message contents (seldom used)
Comments Text comments nearly message (seldom used)
Encrypted Indicates message content is encrypted
10-xxx Identifies user-divers fields

The fields of greatest interest when dealing with malicious east-post or spam are those that identify the putative sender (From, Reply-to, Sender, Return-path, and and then forth), besides every bit all the various received fields that indicate the postal service servers involved in routing the message(south) from the sender to your server. Although those Received lines that don't include a From field do not actually identify a sender, users tin report that spam is being routed through those servers to the Cyberspace service providers (ISPs) or organizations that operate them. In many cases, the provider will be able to filter out the unwanted email rather than forwarding it to the complaining user or some other hapless victim. In fact, it's best to concentrate on the Internet Protocol (IP) accost reported on these lines, because clever eastward-mail service attackers can forge much of this information. For more information on dealing with unwanted eastward-post, including detailed instructions on creating and issuing spam complaints to forwarding server operators, see the excellent article "Reporting SPAM" at www.freelabs.com/~whitis/spam_reporting.html. (This site also contains a useful Links section with further pointers to spam investigation and reporting.)

Unfortunately, email letters are far too easy to spoof, in the sense that knowledgeable individuals tin either use software tools or construct entirely bogus RFC 822 e-mail headers by hand. Thus, non all reports of unwanted forwarding may produce the desired results of eliminating or reducing unwanted post traffic. Some service providers operate special e-mail service services known every bit anonymous or pseudo remailers. These and then-called "anonymizer" services are deliberately designed to shield users from outright or personal identification; many operate outside the United States.

CyberCrimeStopper

Dealing with Anonymizer Service Providers

In some cases, the companies or organizations that operate anonymizer services volition respond favorably to requests for assistance from law enforcement professionals who seek to identify their customers who are using the service for criminal purposes. In other cases, a visitor may turn down to cooperate in any way at all; such lack of cooperation is more likely to occur when anonymizer service providers operate offshore. Withal, some of the near notorious anonymizer services (for example, betimes.penet.fi, originally based in Finland) accept ceased operation, primarily in response to frequent repeated requests to place their customers to law enforcement professionals all over the earth. An old Internet proverb applies when seeking cooperation from anonymous remailers: YMMV ("Your mileage may vary"). This is a polite euphemism for the very real state of affairs in which things practice not work exactly as described or advertised, or assistance with (or from) a service may simply not exist bachelor. It's worth a try (or a warrant, where one can be obtained), but seeking cooperation from these services may not always produce the desired results!

For more information about email header fields and how to interpret them, consult the text for RFC 822 at www.faqs.org/rfcs/rfc822.html, or the article "Reading E-mail Headers" on the StopSpam Web site at world wide web.stopspam.org/electronic mail/headers/headers.html. You'll also find valuable e-mail resources online at http://everythingemail.net and through the Internet Mail service Consortium at www.imc.org.

Looking at Electronic mail Headers

Many east-mail programs don't evidence the full e-mail headers by default in the bulletin, but yous can view the headers if you drill downward through the interface. In Outlook Limited, you tin can view eastward-post headers by right-clicking on a message in the message listing, and then clicking on the Backdrop menu item in the context menu that appears. As shown in Figure 9.ane, clicking on the Details tab allows you to view the e-mail headers associated with that message. In looking at the information in the header, please note that the email addresses have been changed to fictious ones. To view the full HTML code in the electronic mail message, you could and then click on the Message Source button.

Figure 9.1. A Microsoft Outlook Express E-mail Header

If this message were part of a mail bomb assault or spam, you'd want to contact the operators of the various servers identified in the Render-path and From fields, and inside the various Received fields in the header. But first, it would also be useful to employ the whois command at your command line to check the domain names reported against the IP addresses used. Whois allows you find out to whom a domain proper noun is registered.

Windows does not typically include built-in whois capabilities, but numerous sources for Windows-compatible whois utilities are available, such every bit those at www.tatumweb.com/iptools.htm. Or you can use the services at www.samspade.org to perform the necessary lookups through its Web pages without using a whois tool on your Windows PC. Likewise, if yous have access to a UNIX shell account, you lot should exist able to apply the whois command at the command line. Mac OS X has a useful graphical version of whois, as shown in Figure 9.2.

Figure 9.2. The Mac OS X Graphical Whois Utility

Annotation

Other useful commands include nslookup and dig, to map from domain names to IP addresses.

Read full affiliate

URL:

https://world wide web.sciencedirect.com/science/article/pii/B9781597492768000091

Facing the Cybercrime Problem Caput-On

Littlejohn Shinder , Michael Cross , in Scene of the Cybercrime (Second Edition), 2008

Violent or Potentially Violent Cybercrime Categories

Violent or potentially violent crimes that utilise computer networks are of highest priority for obvious reasons: These offenses pose a concrete danger to some person or persons. Types of violent or potentially tearing cybercrime include:

Cyberterrorism

Assault by threat

Cyberstalking

Child pornography

The U.S. Department of Country defines terrorism as "premeditated politically motivated violence perpetrated confronting noncombatant targets by subnational groups or clandestine agents." Cyberterrorism refers to terrorism that is committed, planned, or coordinated in cyberspace—that is, via figurer networks.

This category includes using electronic mail for communications between coconspirators to impart information to be used in violent activities as well as recruiting terrorist group members via Web sites. More ambitiously, information technology could include sabotaging air traffic control estimator systems to cause planes to collide or crash; infiltrating water treatment plant calculator systems to cause contamination of water supplies; hacking into hospital databases and changing or deleting information that could result in incorrect, dangerous handling of a patient or patients; or disrupting the electrical ability grid, which could cause loss of air conditioning in summertime and rut in winter or result in the decease of persons dependent on respirators in private residences if they don't have generator backup.

Assault past threat can be committed via email. This cybercrime involves placing people in fright for their lives or threatening the lives of their loved ones (an criminal offense that is sometimes called terrorist threat). Information technology could also include e-mailed bomb threats sent to businesses or regime agencies.

Cyberstalking is a form of electronic harassment, frequently involving limited or implied physical threats that create fear in the victim and that could escalate to real-life stalking and violent behavior.

Child pornography involves a number of aspects: people who create pornographic materials using minor children, those who distribute these materials, and those who access them. When computers and networks are used for whatsoever of these activities, child pornography becomes a cybercrime.

CyberLaw Review

National Child Pornography Laws

In the United States, information technology is a federal crime (18 USC 2251 and 2252) to annunciate or knowingly receive child pornography. The Child Pornography Prevention Human action of 1996 (CPPA) expanded the definition of child pornography to any visual depiction of sexually explicit carry in which the production involved the apply of a minor engaging in sexually explicit behavior, even if the visual delineation only appears to be of a minor engaging in such conduct or is advertised or presented to convey the impression that it is of a minor engaging in such conduct. The Complimentary Spoken language Coalition sued to have the police struck downwardly every bit unconstitutional, and a federal appellate court did strike down the statute. In October 2001, the Supreme Court heard arguments in the case Ashcroft v. The Gratis Speech communication Coalition on the constitutionality of the CPPA. In Apr 2002, the Supreme Court ruled that the provisions of USC 2256 that prohibit "virtual child pornography" (computer-generated images of children engaging in sexual conduct) are overly broad and unconstitutional.

In the U.k., nether the Protection of Children Deed (1978) and Section 160 of the Criminal Justice Human activity of 1988, it is a criminal offense for a person to possess either a photograph or a "pseudo-photo" of a child that is considered indecent. The term pseudo-photograph is defined equally an prototype made past figurer graphics or that otherwise appears to be a photograph. Typically this is a photograph that is created using a graphics manipulation software programme such as Adobe Photoshop to superimpose a kid's caput on a different torso (the aforementioned type of "virtual child pornography" addressed by the U.S. Supreme Court in its April 2002 conclusion).

Near countries have laws addressing child pornography. For a synopsis of national laws compiled past Interpol (the International Criminal Police Organisation), see the Interpol SexualOffenses Against Children Web site at http://www.interpol.int/Public/Children/SexualAbuse/NationalLaws.

Child pornography is generally considered a violent crime, even if some of the persons involved have had no concrete contact with children. This is the case because sexual corruption of children is required to produce pornographic materials, and because people who are interested in viewing these types of materials often practice non confine their involvement to pictures and fantasies but are instead are practicing pedophiles, or aspire to be, in real life.

On the Scene

Real-Life Experiences

From Detective Glen Klinkhart, Anchorage Police Department Computer Crimes Unit

Not also long ago, a friend of mine with the FBI called me with a asking. He told me that he had received a transcript from an Internet Relay Conversation (IRC) session, and he wanted to tell me virtually it. During the IRC correspondence, i of the participants had written a detailed plan nigh preparing the kidnap and rape of a young boy from a shopping mall. The chat indicated that the mall might be somewhere in our urban center. The FBI agent asked if I would exist interested in reading the chat session logs and giving him my stance of the state of affairs.

When the amanuensis arrived I took a wait at the transcript and was horrified by what I read. The IRC session showed what appeared to be two people chatting online. One, called "PITH," obviously sent the FBI the computer chat logs, and the other was the suspect, known only as "Kimmo." PITH saved the conversation log file and then contacted law enforcement virtually the incident. The chat was a chilling and frightening view into a demented heed.

The viii pages of chat noted extremely graphic, sexually explicit details, which included the very specific ways that the doubtable said he would enjoy "raping" and "torturing" his victim. During the rest of the conversation, the suspect, Kimmo, gave details about the specific shopping mall that he had scoped out and the full general location of his motel, north of the metropolis. Kimmo was very specific about the sexual acts that he was going to perpetrate against his victim. It was apparent that Kimmo had been thinking and fantasizing almost this attack for some time.

The FBI and our section immediately began working on the case. At ane betoken, we had 14 agents and police detectives working on this single investigation. We connected to rail the location of our suspect past going undercover into Internet chat rooms looking for Kimmo, tracing his IP address, and using tools such as search warrants and subpoenas to gather a trail of information leading to our suspect.

The trail led to a divorced begetter living on the outskirts of the urban center. Agents began watching him and his house. Others checked into his background and learned more nearly how he operated. He appeared to have no criminal history; nevertheless, he was very adept at using computers. He also matched many of the details that had been communicated to PITH during the disturbing chat session.

We obtained search warrants for the doubtable's house and prepared to search his part besides. On a articulate, cold morning, we hit the part and the business firm of our doubtable. Some other group of officers attempted to interview the suspect.

When confronted, the suspect played it as though he didn't know what we were talking virtually. He denied any knowledge of the chat session between PITH and Kimmo. When presented with irrefutable testify, including an electronic trail that led directly to his dwelling house estimator, he finally admitted that he was Kimmo. He stated that he participated in the chat considering he was heavily intoxicated at the time. He told investigators that he had never harmed a child and that he would never hurt anyone.

His reckoner systems at dwelling house and at work told another tale. On his home calculator and on various computer media, we plant hundreds of images of child pornography, including images of children being forced into chains and raped. Kimmo had likewise developed a fondness for collecting hundreds of computer drawings depicting children having their bodies sliced, mutilated, and displayed in disturbing and gory manner.

The suspect was arrested. He later on pleaded guilty to possession and distribution of child pornography. He is currently serving his time in federal prison.

Was the doubtable only drunk when he was chatting with PITH? Would he really "never impairment a child," every bit he told u.s.? Would he have grabbed a kid from the mall and taken him to a cabin to be raped and tortured? We might never know for certain. I practice know that for at least the adjacent few years, this guy will not take a run a risk to make adept on his plans, thanks to the hard work of the FBI, the U.Southward. Attorney's office, and our team of dedicated investigators.

Read full chapter

URL:

https://www.sciencedirect.com/science/commodity/pii/B9781597492768000017

The Night Triad and Cyberspace Beliefs

Minna Lyons , in The Nighttime Triad of Personality, 2019

7.three.3 Cyberstalking

By nature, the cyberworld is an platonic place for perpetrating intrusion of privacy of others in the form of stalking. Stalking is obsessive behavior, classified every bit a criminal offense, where the perpetrator wants to gain the attending of the victim by exerting dominance over them. The victims often (but not always) have had some grade of personal human relationship with the stalker. Traditional stalking consists of a battery of behaviors including unwanted phone calls or text letters, showing up at the victim's domicile or workplace, sending unwanted gifts, and spying on the victim's life. The invention of the internet, especially social media, has provided more than tools for the stalkers to help them to practice terror over the victims.

Indeed, cyberstalking has become so mutual information technology now accounts for more stalking cases that face up-to-face stalking (run into McVeigh, 2011, for statistics in the United Kingdom). With regards to the effect that it has on the victim, it is equally harmful every bit traditional stalking. Victims of cyberstalking and can consequence in high number of measures that the victim takes in order to protect themselves. Nobles, Reyns, Fox, and Fisher (2014) listed the self-protection strategies as "fourth dimension off from work or school; changing or quitting a task or schoolhouse; changing the way they went to work or school; avoiding relatives, friends, or holiday celebrations; changing usual activities outside of work or school; staying with friends or relatives or having them stay with y'all; altering advent to be unrecognizable; taking self-defense or martial arts classes; getting pepper spray; obtaining a gun; acquiring any other kind of weapon; changing social security number; irresolute email address; changing phone numbers; installing caller identification or telephone call blocking systems; and changing or installing new locks or a security arrangement" (p. 998). Information technology is easy to see how persistent online stalking tin accept a dramatic influence on the private's life, preventing them from carrying on their everyday activities without a fear.

The online dating environs is particularly a fertile basis for cyberstalking. Much of cyberstalking involves persistent torment of electric current or sometime intimate partners. Sometimes, the victim may accept met the stalker first in an online dating platform. A common story is that a woman meets a man on a dating website and may have a few dates before calling off the budding relationship. However, the other person may have different ideas about their connection with the casual date, resulting in delusional thoughts nigh the intimacy and importance of the relationship. The delusional stalker may first a campaign in the form of persistent online messaging, phone calls, and even post-obit the victim to their domicile or workplace, sometimes with tragic consequences (see Patrick, 2017, for examples of real-life stories). Stalkers may have other motivations besides of deluded ideas of love, and some may torment their victims out of pure maliciousness or the need to dominate.

Despite the prevalence and seriousness of cyberstalking, there has been relatively little research on investigating the phenomena in scientific studies (Nobles et al., 2014). Fifty-fifty less is known about the online strategies of those who are at the higher terminate of the Night Triad continuum. Studies on incarcerated offenders accept found that overall, stalkers score lower on psychopathy than other types of offenders, probably due to the detached interpersonal nature of those loftier in this trait (due east.g., Reavis, Allen, & Meloy, 2008). To put but, psychopaths may not care enough to kickoff obsessing nearly other people, which could brand them less likely to perpetrate stalking. On the other manus, researchers have suggested that some features of narcissism may lead to obsession when the romantic advances are declined, which could make them more likely to stalk the object of their preoccupations (Wilson, Ermshar, & Welsh, 2006). Thus stalking perpetration may not exist the same across all the Dark Triad traits.

Smoker and March (2017) constructed a questionnaire to measure the trend to cyberstalk one's partner with acts such as checking their phone/figurer histories, installing tracking apps on the partners phone to know where they are at all times, constantly checking their social media, and other obsessive acts that happen online. The results were interesting in terms of sex differences. Women were more likely than men to monitor their intimate partners in an online environment. The authors suggested than online stalking could be a depression-cost, covert fashion for women to accomplish intimacy and maintain their relationship. They also plant that irrespective of the sex of the participant, all of the Night Tetrad traits had a meaning, positive human relationship with cyberstalking of intimate human relationship partners. This indicates that aversive personality traits are important in understanding who uses modern technology in following and tracking their partners.

Read total chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780128142912000073

Cybercrimes and investigations

Inge Sebyan Black , Lawrence J. Fennelly , in Investigations and the Art of the Interview (Fourth Edition), 2021

Introduction

Cybercrime is a global threat, and the evidence suggests that this threat will continue to rise. Cyber offense is also ane of the biggest threats to every company, everywhere in the globe. It is too the fastest growing crime in the United States. Cybercrimes involve criminal offenses that are committed through Internet apply or supported in some way, by computer technology. Internet use tin can be through a reckoner, smart phone, or any technology that connects to the Internet. Crimes using the Internet or computer applied science resulting in fraud, identity theft, credit menu fraud, stolen merchandize selling, etc. is known every bit ecommerce criminal offense (ECrime). Other cyberoffenses include bullying, theft, harassment, sending sexually explicit photos, along with many more. With the increase of cybercrime, it is predicted that cybersecurity spending will dramatically rise, both for the need of those trained in cybersecurity and the demand for products.

This chapter illustrates the challenging landscape of this blazon of crime, the technical knowledge needed if we are going to defend against cyberattacks and some of the challenges in trying to combat this offense. Another it crime is to access the computer itself through unauthorized access to tamper with the systems or programs, allowing entry into an individual's information and data. Through admission, the bad actors commit fraud, theft, and more, forth with the ability to proceeds valuable, private personal information.

The tiptop five well-nigh popular cybercrimes are the following i :

1.

phishing scams

2.

identify theft scams

iii.

online harassment

4.

cyberstalking

v.

invasion of privacy

On February 11, 2020 the FBI released their Internet Crime Complaint Center 2019 Cyberspace Crime Report. There were 467,361 complaints, with reported losses in backlog of iii.five billion. 2 They reported phishing, nonpayment/nondelivery, and extortion as the top 3 scams.

The price associated with cybercrime encompasses a wide assortment of costs such as the toll of lost data, loss of currency, theft of personal data (PI), theft of financial information, cost associated with personal health information (PHI), toll to repair and supercede data, fraud, and the loss of reputation. There are other costs, these are merely a few. We are witnessing an evolution of cybercrime, in office due to the IoT (Internet of Things) and the increase of smart phones, smart watches, cameras, implantable medical devices (i.due east., pacemakers), and Bluetooth devices (i.e., headsets, speakers).

Read total chapter

URL:

https://world wide web.sciencedirect.com/scientific discipline/article/pii/B9780128221921000209

Internet Addiction

Qiaolei Jiang , ... Ran Tao , in Principles of Addiction, 2013

Emotional Risks

In some cases, engaging in cybersex may pose some emotional risks. Cybersex participants may endeavor something that goes beyond his or her normal condolement range. Some online survey found that cybersex seduces some users into crossing boundaries into sexual thinking, fantasy, longing, and activities in which they may do not want to participate. Some cybersexual encounters can be quite psychologically dissentious. Moreover, the issue of sexually related Internet crime, such as cyberstalking, sexual harassment, and molestation may also be imported into cybersex. Some researchers have suggested that the use of cybersex may exist counterproductive to normal, healthy sexual evolution in certain individuals.

Cybersex is commonly associated with no necessary commitments. Many people participate in cybersex but for enjoyment, without whatever intention to have the relationship further. While some individuals bask cybersex considering of the lack of commitment, others may find this disappointing. For someone who has built an intimate relationship with his/her cybermate, a sudden loss may occur when one private disappears without warning and the relationship ends abruptly. Someone may feel injure and aroused when he/she goes online discover his/her cybermate has vanished, leaving no trail to follow. Such a sudden loss or cyber breakup can be emotionally upsetting. Therefore, for those who are seeking a long-term committed relationship, they need to be careful when getting too emotionally involved.

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780123983367000814