1 / 8

14Cyberstalking

14Cyberstalking. Dr. John P. Abraham Professor University of Texas Pan American. Stalking. Fixation on victims Obsession May expose themselves Attempts to discourage them may have the opposite effect

kalb
Download Presentation

14Cyberstalking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 14Cyberstalking Dr. John P. Abraham Professor University of Texas Pan American

  2. Stalking • Fixation on victims • Obsession • May expose themselves • Attempts to discourage them may have the opposite effect • California law: “ Any person who willfully, maliciously, and repeatedly follows or harasses another person and who makes credible threat with the intent to place that person in reasonable fear of death or great bodily injuri is guilty of crime of stalking.”

  3. How cyberstalkers operate • Generally had prior acquaintance with the victim. Also, find a person in social sites, chatrooms, or during interviews, personal contacts, etc. • Email contacts, anonymous contacts, or set up a phony website and give out the victim’s email account. • Stalkers want to exert power over their victims through fear.

  4. Investigating Cyberstalking • Assume identity of the cyberstalker is unknown • Interview victim: determine if crime was committed. check for evidence of cyberstalking .Obtain details about victim in light of victimology. • Interview others. Obtain a more complete picture. What risk was the offender willing to take. • Assess where initial contact may have been and search for additional digital evidence. • Examine cybertrails for distinguishing features: location, time, method of approach, etc. • Motivation. What need was the offender fulfilling.

  5. Victimology • Does the victim know how and when cyberstaking began. • What internet service the victim uses, why? What is the purpose for the use? • What online services used and why? Web, email, usernet, irc, etc. • Any personal websites or pages? What info is there?

  6. Risk Assessment • What was posted on the internet, the extend of information voluntarily put up. • What might be high risk in physical world may not seem a resk on the cyberworld. But it can be. • Asses the risk to the victim as well as the offender. What was the offender willing to risk.

  7. Case study • In California, after being turned down by Randi Barber, Gary Dellapenta impersonated her and posted a fantasy about being raped. Dellapenta gave Barber’s address and ways to short circuit her alarm. There is more to this story, please read.

  8. Motivation • Satisfaction by intimidating • Power assertive • Retaliate against victims for perceived wrongs • Rage

More Related