Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
ANNOTATED BIBLIOGRAPHY ON INTERNET FRAUD
cyberstalking and cybercrime
essay on internet frauds
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: ANNOTATED BIBLIOGRAPHY ON INTERNET FRAUD
Cyberstalking is the act of “using the Internet to harass, threaten, or intimidate another person” according to Chuck Easttom (2012). The following provides a synopsis of five recent cases where people have been convicted of cyberstalking or Internet fraud. Each case is analyzed for its relevance in contemporary legal issues, as well as any laws that pertain to the case.
Cyberstalking Abuse and Fraud Cases
According to John de Leon (2013), on December 17th 2013, a Seattle police detective name David Blackmer pleaded guilty to charges of cyberstalking and domestic violence. Blackmer was having an affair with a woman he met on a dating website, but the relationship soured, and the woman went over to the detective’s home to tell his wife about the affair. When she did, Blackmer grabbed her by the throat and threw her to the ground. After she left, the detective created a fake Facebook account in the woman’s name and posted nude photos of her that had been taken during the affair. Due to the conviction of domestic violence, Blackmer will no longer be permitted to own a firearm, and will most likely lose the ability to work as a police officer. This case illustrates how Facebook is often used as a tool for revenge and malicious behavior.
In 1996 a woman named Jane Hitchcock became the target of a group that was scamming people by posing as literary agents. When she realized that the person she was communicating with was a fraud, Jane contacted the authorities to stop the group. In retaliation, the group began to slander Jane over the Internet, and posted her address and phone number in an attempt to cause her harm. Now Jane is the president of an organization that helps victims of online abuse. According to Davar Ardalan and Laura...
... middle of paper ...
...s, So Does Online Harassment. Retrieved December 21, 2013 from http://www.npr.org/templates/story/story.php?storyId=18429922
Astor, W. (2013). Moldavian man admits to Internet scam. Retrieved December 21, 2013 from http://www.rbj.net/article.asp?aID=203825
De Leon, J. (2013). SPD officer pleads guilty to cyberstalking ex-mistress. Retrieved December 21, 2013 from http://blogs.seattletimes.com/today/2013/12/spd-officer-pleads-guilty-to-cyberstalking-ex-mistress/
Easttom, C. (2012). Computer security fundamentals. Indianapolis. Pearson.
Fox19. (2013). Covington man pleads guilty to internet fraud. Retrieved December 21, 2013 from http://www.fox19.com/story/24063399/melvin-dietz-of-covington-pleads-guilty-to-internet-fraud
Thompson, S. (2013). Oldsmar man pleads guilty to cyberstalking. Retrieved December 21, 2013 from http://tbo.com/article/20131217/ARTICLE/131219302
In the largest hacking and data breach scheme to be prosecuted in the United States, Dmitriy Smilianets, a Russian national, has pleaded guilty to conspiracy to commit wire fraud. Mr. Smilianets, along with four others were alleged to have perpetrated the crimes which resulted in more than 160 million credit card numbers being stolen and damages exceeding $300 million dollars.
The National Conference of State Legislatures (2013) defines Cyber stalking as the use of the internet, email or other electronic communications to stalk. It generally refers to a pattern of threatening behaviors or malicious intent. The NCSL considered it the most dangerous of cyber harassments. According to the Louisiana statute, Cyberstalking is the actions of any person to perform the following:
On September 7, 2012, a 15-year-old girl named Amanda Todd posted an eight-minute-long video describing her struggle with online bullying. In the video, Todd describes how her tormentor had used a photo in which she flashed her breasts as a tool for extortion. Ultimately, the stress was too much and on October 12, 2012, Amanda Todd committed suicide. Her suicide drew mass attention from both the mainstream media and an online following. In addition, her suicide brought to light a growing online problem that we’ve now termed “sextortion”. To avenge the suicide of Todd, the hacktivist group Anonymous provided details online of a man they claimed was responsible for the harassment of Todd that led to her suicide. The act drew praise from the online community but also quick condemnation by law enforcement because of a lack of due process. In the end, the person named by Anonymous was never linked to Amanda Todd or her suicide.
On April 5, 1999, 22 year old, Aaron McKinney was found guilty of felony murder, second-degree murder, kidnapping and robbery. 21 year old, Russell Henderson pled guilty to kidnapping and felony murder and was sentenced to two consecutive life terms. Two women described as the suspects girlfriends, Chasity Vera Pasley (20) and Krista Lean Price (18) were charged as accessories after the fact of first-degree murder (The Data Lounge, Issues 2000, [on-line]).
180). Pittaro (2007) defines cyberstalking as the use of the internet, email, or other electronic communication devices to create a criminal level of intimidation, harassment, and fear in victims (Pittaro, 2007, p. 180). In this definition, the cyberstalker is one who carries out these acts when targeting a victim. What causes cyberstalking is rage, power, control, anger, and the victim’s actions and inactions (Pittaro, 2007, p. 180). Cyberstalkers use the internet to hide and conceal their identity, known as a veil of anonymity (Pittaro, 2007, p. 180). The majority of cyberstalkers are middle upper-class Caucasian males and many cyberstalkers have a prior criminal record, a history of substance abuse, or a personality disorder (Pittaro, 2007, p. 181). Although, victims of cyberstalking are often complete strangers who were contacted by a cyberstalker through the internet which accounts for about 50% of all cyberstalking incidents (Pittaro, 2007, p. 181). The difference between cyberstalking and regular stalking is the physical contact element between victim and perpetrator (Pittaro, 2007, p. 182). Another difference, is that the geographic proximity between the victim and the perpetrator is closer in regular stalking and much larger in cyberstalking as it can literally happen anywhere (Pittaro, 2007, p. 182). The main method perpetrators of cyberstalking utilize is email over other electronic communication devices and their main motives for cyberstalking are revenge/retaliation (Pittaro, 2007, p. 183). A study done by McFarlane and Bocij (2005) (as cited in Pittaro, 2007, p. 184) found that there are four types of
A 14-year-old girl was chatting with a child predator on social media for a month before deciding to meet in the woods near the girls’ home. The sex predator, Jarred Workman was hiding in the girl’s closet for five days, raping her at night repeatedly. He was found by the little girl’s mother, when she was putting something in the girl’s closet. When he ran he dropped his wallet and phone, making it easier for authorities to locate him (Murdock). The victim’s story is not unique. Many young people are on social media and are unaware of the danger.
Haley, Jacqueline. "Anonymity of Cyberstalkers: The Cyber-Watchdog's Tough Collar." Georgia State University College of Law May 2001.
Cyberstalking, simply is stalking someone on social media or any other websites. It has been common the use of latest devices, mostly the social media, to harass someone. Common features include false accusations, monitoring, threats, identity theft, and data destruction or manipulation.
The World Wide Web and Internet are great places to study, work, or even play. But there is an ugly side of cyberspace. Cyberspace reflects the real world and some people tend to forget that. Cyberstalking and harassment are problems that a large number of people (especially women) are realizing. (Jenson, 1996, p.1)
Wall D., 2008, ‘Cybercrime, Media and Insecurity: The Shaping of Public Perceptions of Cybercrime’, International Review of Law, Computers and Technology, vol. 22, no. 1-2, pp. 45-63.
Violence against women is not always physical. With the continuing advancements in technology, cyber stalking is an increasing way for predators to attack women. “Cyber stalking is the use of the Internet or other electronic means to stalk someone which may be a computer crime or harassment.” The anonymity of interacting with someone online makes it very easy to stalk someone without even leaving home. Cyber stalkers have a sense of security that since they are not seen, they will not be identified. It is estimated that over 75% of victims are women. This estimated figure is lower than the actual number because a large majority of cyber stalking goes unreported.
Stutzky suggests that cyber bullying is the use of modern communication technologies to embarrass, humiliate, threaten, or intimidate an individual in the attempt to gain power and control over them. Bullying has been around since the beginning of time. These days however, bullying isn’t just happening on the playground, it’s happening on the internet and mobile phones, making it possible to bully a child 24 hours a day. Cyber bullying follows children around the clock and into the safety of their own bedrooms. A recent survey by MindOh!, an educational company that follows youth trends, reported that nearly 80% of the 5,500 teens that were surveyed said that they had been exposed to cyber bullying. Cyber bullying affects the mental health of so many young adolescents around the world, and the issue is steadily increasing as more and more ways to bully are created.In extreme incidents, cyber bullying has led teenagers to suicide. Most victims, however, suffer shame, embarrassment, anger, depression and withdrawal. While technology continues to evolve, new means of communication enable today’s bullies to become more effective in terrorizing and tormenting their victims. The aim was to increase awareness and decrease the prevalence of cyber bullying- Year 9 at Meridan State College being the stakeholders (people involved).
Lenard, Thomas I. “Identity Theft Is a Declining Problem.” Cyber Crime. Ed. Louise I. Gerdes.
"What is “online fraud”?" National Crime Victim Law Institute. Lewis & Clark, 27 July 2010. Web. 24 Jan. 2014.
Wolf, Ulf. “Cyber-Crime: Law Enforcement Must Keep Pace With Tech-Savvy Criminals.” Digitalcommunities 27 Jan. 2009 .