Cyber-Stalking Case

773 Words2 Pages

What are the steps to investigate a cyber-stalking case end-to-end? The steps necessary to investigate and solve cyber stalking cases from start to finish require much skill and a lot of patience. Not only must an investigator be well-versed at basic law enforcement investigation techniques, they must also be knowledgeable in the components and data storage of computer systems. Having a keen eye and attention to detail will also be a valued skillset for a cyber-stalking investigation.
The first step would be identifying that a cyber-stalking crime has occurred. Cyber stalking can be defined as “the use of the Internet, email or other electronic communications to stalk, and generally refers to a pattern of threatening or malicious behaviors.” …show more content…

E-evidence can be anything from emails, internet cookies, text conversations in chat rooms, and through uses of social media sites such as MySpace, Facebook or Twitter. Once information about cyber-stalking has been found, the next course of action is to try and trace back the E-evidence to a specific person. Once a person has been identified as the root cause of the cyber-crime, then convicting the criminal of the cyber-crime must come next, utilizing the E-evidence found as well as witness and victim statements, if there are any available to use. In many cases, victims of cyber-crime may not even realize they are a …show more content…

In the book, there are described the above 5 steps in an investigation, then as you read along, there are more techniques and processes explained about other steps involved in an investigation in their own order that seem to be explained quite different than the 5 steps I’ve described above. Which is it?I suppose there are investigative steps directly related to cyber-stalking as opposed to computer crime in general. Part of the process also includes the admissibility of E-evidence in cyber-crime cases. Even though much evidence could be collected, a good majority of it may not be able to be used. This is called inadmissible evidence. (Volonino,

More about Cyber-Stalking Case

Open Document