What are the steps to investigate a cyber-stalking case end-to-end? The steps necessary to investigate and solve cyber stalking cases from start to finish require much skill and a lot of patience. Not only must an investigator be well-versed at basic law enforcement investigation techniques, they must also be knowledgeable in the components and data storage of computer systems. Having a keen eye and attention to detail will also be a valued skillset for a cyber-stalking investigation.
The first step would be identifying that a cyber-stalking crime has occurred. Cyber stalking can be defined as “the use of the Internet, email or other electronic communications to stalk, and generally refers to a pattern of threatening or malicious behaviors.”
…show more content…
E-evidence can be anything from emails, internet cookies, text conversations in chat rooms, and through uses of social media sites such as MySpace, Facebook or Twitter. Once information about cyber-stalking has been found, the next course of action is to try and trace back the E-evidence to a specific person. Once a person has been identified as the root cause of the cyber-crime, then convicting the criminal of the cyber-crime must come next, utilizing the E-evidence found as well as witness and victim statements, if there are any available to use. In many cases, victims of cyber-crime may not even realize they are a …show more content…
In the book, there are described the above 5 steps in an investigation, then as you read along, there are more techniques and processes explained about other steps involved in an investigation in their own order that seem to be explained quite different than the 5 steps I’ve described above. Which is it?I suppose there are investigative steps directly related to cyber-stalking as opposed to computer crime in general. Part of the process also includes the admissibility of E-evidence in cyber-crime cases. Even though much evidence could be collected, a good majority of it may not be able to be used. This is called inadmissible evidence. (Volonino,
The National Conference of State Legislatures (2013) defines Cyber stalking as the use of the internet, email or other electronic communications to stalk. It generally refers to a pattern of threatening behaviors or malicious intent. The NCSL considered it the most dangerous of cyber harassments. According to the Louisiana statute, Cyberstalking is the actions of any person to perform the following:
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009).
Evidence essentially comes in two forms: verbal or physical. For instance, verbal evidence could be spoken evidence acquired from a wiretap. Physical evidence could include DNA, blood, or bodily samples. Another reliable origin evidence is digital documentation. “As technology has become more portable and powerful, greater amounts of information are created, stored, and accessed” (GEDJ). Over the past few decades, technology has advanced to extreme levels! The most common technology used to find digital evidence are cell phones, computers, tablets, external storage devices, GPS locators, and various other devices (GEDJ). Text messages, social media posts, pictures, etc. are becoming more common data in investigations of the modern era. “Digital evidence can come from both suspects and victims, as all involved parties may have their own personal devices that are relevant to the investigation” (GEDJ). If they are available, computers, phones, social media and much more are very useful sources of gathering data for a criminal case. For instance, both the suspect and the victim may have text messages on their cell phones that could add to the search. “In some criminal cases, digital evidence can be useful if the suspect had associated with it. In some cases it can lead in the wrong direction or to the wrong people. Or it could simply be useless if the suspect didn 't use anything digital”
middle of paper ... ... It is crucial to take precautions to ensure you protect yourself from becoming a victim of this horrible crime. If you notice any suspicious behavior, or feel like you are a victim of stalking, call law enforcement or call a help line before it’s too late.
A structured standardized approach to any evidence collection is going to be the best course of action. Any well-training computer forensic technicians should not jump into a search without some kind approved policy procedure which will include a checklist or standard operating procedure that will methodically guide them throughout the examination procedure. The cyber forensics should not be taken lightly and it starts with its collection methods.
Based on a study done by Schwartz-Watts and Morgan at the American Academy of Psychology Law, they found that stalking was far more prevalent than anyone had imagined: 8% of American women and 2% of American men will be stalked in their lifetimes. That’s 1.4 million American stalking victims every year.
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
Organizations and courts now know the significant need for a convenient digital forensic process when a digital crime occurs. In the early 21st, convenient guidelines and practices are being improved to formalize a computer forensic. Generall...
The first issue to discuss is determining the motive of the stalker. There is not one type of stalker; this is reflected by the numerous categories created pertaining to a stalker’s motive. Typologies have been created to illustrate these varying types of stalkers. One typology, developed by Zona, Palarea and Lane (1998), used information gathered from ...
There have been many examples of cyberstalking crossing over in to real life stalking. And those users who have been victims of cyberstalking, tell a similar story, that no one took the harassment serious until it became real life stalking. Cyberstalking can be a devastating experience for a person online. But in cyberspace people say things like “well just turn off your computer” and “ you can’t be hurt on the Internet, it’s just words”. (Laughren, 1998, p.1) The online stalking is just as frightening and distressing as off-line stalking, and just as illegal.
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
Violence against women is not always physical. With the continuing advancements in technology, cyber stalking is an increasing way for predators to attack women. “Cyber stalking is the use of the Internet or other electronic means to stalk someone which may be a computer crime or harassment.” The anonymity of interacting with someone online makes it very easy to stalk someone without even leaving home. Cyber stalkers have a sense of security that since they are not seen, they will not be identified. It is estimated that over 75% of victims are women. This estimated figure is lower than the actual number because a large majority of cyber stalking goes unreported.
Criminal Investigation is not a simple act, criminal investigations have many different types of crime scenes, and complicated stages to follow during an investigation. There are many different kinds of crimes, therefore there are many different types of crime scenes. To investigators, the first step of any crime scene, is figuring out what type it is (Penven, Don). There may be many different types of crime scenes, but all crimes can be put under one of three main categories of crime. The different types of scenes, dictate how the procedure of the investigation.
Since the old times primary investigations do not typically yield enough information to prosecute a criminal case. The information yielded in criminal investigations may be used to prosecute a criminal case or can even assist in a federal case. Even though primary investigations can identify a lot of evidence and information, a secondary investigation will usually identify further details and allows for a second look at everything pertaining to the investigation. This paper is to explain criminal investigations and the necessary tools and skills needed to conduct and thorough investigation.
With the development in technology cyber bullying and cyber crimes became a serious issue. Cyber bullying is terms as the use of electronic means of communication so as to bully an individual and most typically it occurs when one sends messages that are threatening or of an intimidating nature (Florence, 2014). Cyber crime on the other hand refers to crime that involves a network and a computer and in regard to this the computer or network may be the target (Study.com, n.d). Cyber bullying and cyber crimes are well known problem in the world but they aren’t noticed like bullying and crimes but they can be harmful and serious.