internet vulnerabilities & criminal activities

29
4.2 – 10/3/2011 Social Networking, Cyberbullying, & Cyberstalking

Upload: kanan

Post on 12-Jan-2016

24 views

Category:

Documents


0 download

DESCRIPTION

Internet Vulnerabilities & Criminal Activities. 4.2 – 10/3/2011 Social Networking, Cyberbullying, & Cyberstalking. Is Cyberspace really a place?. What should the jurisdiction be?. Disinhibition. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Internet Vulnerabilities & Criminal Activities

4.2 – 10/3/2011Social Networking,

Cyberbullying, & Cyberstalking

Page 2: Internet Vulnerabilities & Criminal Activities

What should the jurisdiction be?

Page 3: Internet Vulnerabilities & Criminal Activities

“Unrestrained behavior resulting from a lessening or loss of inhibitions or a disregard of cultural constraints.”

Page 4: Internet Vulnerabilities & Criminal Activities
Page 5: Internet Vulnerabilities & Criminal Activities

Don’t forget that your profile and MySpace forums are public spaces.

People aren't always who they say they are. Harassment, hate speech and inappropriate

content should be reported. Don't post anything that would embarrass

you later. Don't say you're over 18 if you're not. Don't

say you're younger than 18 if you're not.

Page 6: Internet Vulnerabilities & Criminal Activities

Never share your password with anyone. Adjust your privacy settings to match your level

of comfort, and review them often. Be cautious about posting and sharing personal

information… Report users and content that violate our

Statement of Rights and Responsibilities. Block and report anyone that sends you

unwanted or inappropriate communications. Remember that while Facebook has always been

based on a real name culture, and using fake names is a violation of our Statement of Rights and Responsibilities, people are not always who they say they are.

Page 7: Internet Vulnerabilities & Criminal Activities

Account Hijacking Spam Phishing Malware Child Exploitation Burglary Cyberbullying Cyberstalking

Page 8: Internet Vulnerabilities & Criminal Activities

Too Much Information!! Personal Information

• Real name• Address• Phone number• Family members

Work Information• Employer• Job position

Personal Schedule• Work schedule• Vacations

Page 9: Internet Vulnerabilities & Criminal Activities

Open Source information “Evidence Hub” Information about criminal acts Evidence of actions by known

criminals Finding suspects MySpace Predator Caught by Code -

http://www.wired.com/science/discoveries/news/2006/10/71948?currentPage=all

Page 10: Internet Vulnerabilities & Criminal Activities

“The use of e-mail, instant messaging, chat rooms, pagers, cell

phones, or other forms of information technology to

deliberately harass, threaten, or intimidate someone.”

Page 11: Internet Vulnerabilities & Criminal Activities

Used more & more by children & teens

May be anonymous Bully may be unknown to victim Can reach a larger audience Invades the victim’s home

• No retreat from bully

Page 12: Internet Vulnerabilities & Criminal Activities

Text messages Pictures or videos of someone being

bullied Private pictures made public Cell phone calls E-mail Chat rooms Instant messaging Websites Online threats Creating fake profiles

Page 13: Internet Vulnerabilities & Criminal Activities

Computer fraud Sexual harassment / cyber harassment Child pornography Physical harm / suicide Some states have cyberbullying laws

• http://www.cyberbullyalert.com/blog/category/cyber-bullying-law/

Linda Sanchez (D, CA) – has twice (08 & 09) introduced Megan Meyer Cyberbullying Prevention Act

Page 14: Internet Vulnerabilities & Criminal Activities

“A pattern of repeated and unwanted attention, harassment, contact, or any other

course of conduct directed at a specific person that would cause a reasonable person to feel fear done via electronic

means.”

Page 15: Internet Vulnerabilities & Criminal Activities

Control of victim’s behavior

Revenge

Resume a previous relationship

Page 16: Internet Vulnerabilities & Criminal Activities

All states have laws regarding stalking• California 1st in 1990

Six states have cyberstalking laws• Illinois, Louisiana, Mississippi, North

Carolina, Rhode Island, and Washington Other states use stalking laws and

harassment laws Connecticut stalking laws -

http://www.ncvc.org/SRC/main.aspx?dbID=DB_Connecticut195

Page 17: Internet Vulnerabilities & Criminal Activities

Zona and colleagues (1993) – 3 types• Simple Obsessional• Erotomania• Love Obsessional

(Mullen, Pathe, Purcell, and Stuart, 1999) – 5 types based on motivation & context• The Rejected• The Intimacy Seeker• The Incompetent• The Resentful• The Predatory

Page 18: Internet Vulnerabilities & Criminal Activities

A prior relationship exists between the victim and the stalker which includes the following:• Acquaintance, neighbor, customer, professional

relationship, dating, and lover The stalking behavior begins after

either:• The relationship has gone “sour”• The offending individual perceives some

mistreatment The stalker begins a campaign either to

rectify the schism, or to seek some type of retribution

Page 19: Internet Vulnerabilities & Criminal Activities

Based on the Diagnostic Statistical Manual, 4th ed. The central theme of the delusion is that another

person is in love with the individual The delusion often concerns idealized romantic love

and spiritual union rather than sexual attraction — “a perfect match”

The object of affection is usually of a higher status and can be a complete stranger

Efforts to contact the victim are common, but the stalker may keep the delusion a secret

Males, seen most often in forensic samples, come into contact with the law during misguided pursuits to “rescue” the individual from some imagined danger.

Females are seen most often in clinical samples

Page 20: Internet Vulnerabilities & Criminal Activities

Similar to the erotomanic individuals:• The victim is almost always known through the

media.• The delusion that the victim loves them may also be

held The erotomanic delusion is but one of several

delusions and psychiatric symptoms — this individual has a primary psychiatric diagnosis

These individuals may be obsessed in their love, without having the belief that the target is in love with them

A campaign is begun to make his/her existence known to the victim

Page 21: Internet Vulnerabilities & Criminal Activities

* As a result of a relationship dissolution (i.e. estrangement, disruptions, break-ups) from an ex-partner (but inclusive of a parent, friend, or work associate) this type of stalker can be observed desiring a mixture of reconciliation and revenge.

This individual often experiences feelings of loss, frustration, anger, jealousy, malevolence, and depression.

The Simple Obsessional subtype given previously closely approximates this type of stalker.

Page 22: Internet Vulnerabilities & Criminal Activities

These stalkers pursue an intimate relationship with an individual perceived as their true love, but their attentions are not wanted by the object of their affection.

The type of stalkers who fall into this category often have a delusional disorder (i.e. erotomania). Those who represent "intimacy seekers" may suffer from other disorders (i.e. schizophrenia, mania) or hold morbid infatuations.

Erotomania and Love Obsessional best represent this category.

Page 23: Internet Vulnerabilities & Criminal Activities

These intellectually limited and socially incompetent individuals desire intimacy, but the object of their affection does not reciprocate these feelings.

They often lack sufficient skills in courting rituals.

They may also display a sense of entitlement: believing they deserve a partner, but lack the ability or desire to engage in subdued, preliminary interpersonal relations.

Another aspect of these stalkers is that they may have had previous stalking victims.

Unlike the intimacy seekers, those in the incompetent category do not view the victim as having unique qualities; they are not infatuated with the victim -- only attracted, and do not assert that the affection is mutual.

Page 24: Internet Vulnerabilities & Criminal Activities

The goal of this stalker is to frighten and distress the victim.

These stalkers may also experience feelings of injustice and desire revenge.

Page 25: Internet Vulnerabilities & Criminal Activities

The power and control that comes from stalking a victim gives these stalkers a great deal of enjoyment.

The stalker often strives to learn more about the victim.

The stalker may even mentally rehearse a plan to attack the victim.

Most of these stalkers are diagnosed paraphilias and, compared to the previous four categories, they were more likely to have histories of sexual offense convictions.

Page 26: Internet Vulnerabilities & Criminal Activities

May be in different physical location than the victim

Stalker may use multiple online identities

The victim may not know the stalker Stalker engages in different types of

activities Anonymity

• Stalker may be embolden• Stalker may leave sparse identity clues

Page 27: Internet Vulnerabilities & Criminal Activities

E-mail stalking – direct communication via e-mail

Internet stalking – global communications via the Internet

Computer stalking – taking control of victim’s computer

SMS – short message service & text messaging

Page 28: Internet Vulnerabilities & Criminal Activities

Control of victim and victim’s behavior

Page 29: Internet Vulnerabilities & Criminal Activities

Damaging victim’s reputation by online means

Can be more serious than physical stalking• Information can be more widespread• Information can be found online for a long

time