Internet Vulnerabilities & Criminal Activities

Post on 12-Jan-2016

24 views 0 download

description

Internet Vulnerabilities & Criminal Activities. 4.2 – 10/3/2011 Social Networking, Cyberbullying, & Cyberstalking. Is Cyberspace really a place?. What should the jurisdiction be?. Disinhibition. - PowerPoint PPT Presentation

Transcript of Internet Vulnerabilities & Criminal Activities

4.2 – 10/3/2011Social Networking,

Cyberbullying, & Cyberstalking

What should the jurisdiction be?

“Unrestrained behavior resulting from a lessening or loss of inhibitions or a disregard of cultural constraints.”

Don’t forget that your profile and MySpace forums are public spaces.

People aren't always who they say they are. Harassment, hate speech and inappropriate

content should be reported. Don't post anything that would embarrass

you later. Don't say you're over 18 if you're not. Don't

say you're younger than 18 if you're not.

Never share your password with anyone. Adjust your privacy settings to match your level

of comfort, and review them often. Be cautious about posting and sharing personal

information… Report users and content that violate our

Statement of Rights and Responsibilities. Block and report anyone that sends you

unwanted or inappropriate communications. Remember that while Facebook has always been

based on a real name culture, and using fake names is a violation of our Statement of Rights and Responsibilities, people are not always who they say they are.

Account Hijacking Spam Phishing Malware Child Exploitation Burglary Cyberbullying Cyberstalking

Too Much Information!! Personal Information

• Real name• Address• Phone number• Family members

Work Information• Employer• Job position

Personal Schedule• Work schedule• Vacations

Open Source information “Evidence Hub” Information about criminal acts Evidence of actions by known

criminals Finding suspects MySpace Predator Caught by Code -

http://www.wired.com/science/discoveries/news/2006/10/71948?currentPage=all

“The use of e-mail, instant messaging, chat rooms, pagers, cell

phones, or other forms of information technology to

deliberately harass, threaten, or intimidate someone.”

Used more & more by children & teens

May be anonymous Bully may be unknown to victim Can reach a larger audience Invades the victim’s home

• No retreat from bully

Text messages Pictures or videos of someone being

bullied Private pictures made public Cell phone calls E-mail Chat rooms Instant messaging Websites Online threats Creating fake profiles

Computer fraud Sexual harassment / cyber harassment Child pornography Physical harm / suicide Some states have cyberbullying laws

• http://www.cyberbullyalert.com/blog/category/cyber-bullying-law/

Linda Sanchez (D, CA) – has twice (08 & 09) introduced Megan Meyer Cyberbullying Prevention Act

“A pattern of repeated and unwanted attention, harassment, contact, or any other

course of conduct directed at a specific person that would cause a reasonable person to feel fear done via electronic

means.”

Control of victim’s behavior

Revenge

Resume a previous relationship

All states have laws regarding stalking• California 1st in 1990

Six states have cyberstalking laws• Illinois, Louisiana, Mississippi, North

Carolina, Rhode Island, and Washington Other states use stalking laws and

harassment laws Connecticut stalking laws -

http://www.ncvc.org/SRC/main.aspx?dbID=DB_Connecticut195

Zona and colleagues (1993) – 3 types• Simple Obsessional• Erotomania• Love Obsessional

(Mullen, Pathe, Purcell, and Stuart, 1999) – 5 types based on motivation & context• The Rejected• The Intimacy Seeker• The Incompetent• The Resentful• The Predatory

A prior relationship exists between the victim and the stalker which includes the following:• Acquaintance, neighbor, customer, professional

relationship, dating, and lover The stalking behavior begins after

either:• The relationship has gone “sour”• The offending individual perceives some

mistreatment The stalker begins a campaign either to

rectify the schism, or to seek some type of retribution

Based on the Diagnostic Statistical Manual, 4th ed. The central theme of the delusion is that another

person is in love with the individual The delusion often concerns idealized romantic love

and spiritual union rather than sexual attraction — “a perfect match”

The object of affection is usually of a higher status and can be a complete stranger

Efforts to contact the victim are common, but the stalker may keep the delusion a secret

Males, seen most often in forensic samples, come into contact with the law during misguided pursuits to “rescue” the individual from some imagined danger.

Females are seen most often in clinical samples

Similar to the erotomanic individuals:• The victim is almost always known through the

media.• The delusion that the victim loves them may also be

held The erotomanic delusion is but one of several

delusions and psychiatric symptoms — this individual has a primary psychiatric diagnosis

These individuals may be obsessed in their love, without having the belief that the target is in love with them

A campaign is begun to make his/her existence known to the victim

* As a result of a relationship dissolution (i.e. estrangement, disruptions, break-ups) from an ex-partner (but inclusive of a parent, friend, or work associate) this type of stalker can be observed desiring a mixture of reconciliation and revenge.

This individual often experiences feelings of loss, frustration, anger, jealousy, malevolence, and depression.

The Simple Obsessional subtype given previously closely approximates this type of stalker.

These stalkers pursue an intimate relationship with an individual perceived as their true love, but their attentions are not wanted by the object of their affection.

The type of stalkers who fall into this category often have a delusional disorder (i.e. erotomania). Those who represent "intimacy seekers" may suffer from other disorders (i.e. schizophrenia, mania) or hold morbid infatuations.

Erotomania and Love Obsessional best represent this category.

These intellectually limited and socially incompetent individuals desire intimacy, but the object of their affection does not reciprocate these feelings.

They often lack sufficient skills in courting rituals.

They may also display a sense of entitlement: believing they deserve a partner, but lack the ability or desire to engage in subdued, preliminary interpersonal relations.

Another aspect of these stalkers is that they may have had previous stalking victims.

Unlike the intimacy seekers, those in the incompetent category do not view the victim as having unique qualities; they are not infatuated with the victim -- only attracted, and do not assert that the affection is mutual.

The goal of this stalker is to frighten and distress the victim.

These stalkers may also experience feelings of injustice and desire revenge.

The power and control that comes from stalking a victim gives these stalkers a great deal of enjoyment.

The stalker often strives to learn more about the victim.

The stalker may even mentally rehearse a plan to attack the victim.

Most of these stalkers are diagnosed paraphilias and, compared to the previous four categories, they were more likely to have histories of sexual offense convictions.

May be in different physical location than the victim

Stalker may use multiple online identities

The victim may not know the stalker Stalker engages in different types of

activities Anonymity

• Stalker may be embolden• Stalker may leave sparse identity clues

E-mail stalking – direct communication via e-mail

Internet stalking – global communications via the Internet

Computer stalking – taking control of victim’s computer

SMS – short message service & text messaging

Control of victim and victim’s behavior

Damaging victim’s reputation by online means

Can be more serious than physical stalking• Information can be more widespread• Information can be found online for a long

time