![]() |
||||||||||
|
|
||||||||||
Cyber-stalking, Privacy Intrusion at Its Scariest Many crimes that are committed in the real world also occur on the Net. These include fraud and embezzlement, harassment, "stealing" an identity, and stalking. A lot of information is available about you on the Net, and an enterprising criminal can find out a lot about you and use this information to his/her disadvantage. A criminal could use basic information about you (discovered on the Net), and then engage in "social engineering"--contacting your friends, co-workers, relatives, etc.--to learn even more. Social engineering is the art of soliciting participation of a person instead of hacking into a system directly. Most often the target is information the person or victim gives without knowing it, at least until its too late. Because even though its a slower process, human vulnerabilities make it easier to obtain information that leads to more information via the net. But what if the target is the physical person instead of data or hardware? Its called Cyber-stalking, a serious problem that is increasingly becoming more of a threat as stalkers take advantage of the Internet and other technologies. This paper describes Cyber-stalking and what you can do, or not do, to prevent it. What is Cyber-stalking? Cyber-stalkers use the Internet, e-mail, or other methods of electronic communications to stalk or harass another person. Although the term cyber-stalking does not involve physical contact, it is just as threatening as being stalked physically. "Make no mistake: this kind of harassment can be as frightening and as real as being followed and watched in your neighborhood or in your home." Vice President, Al Gore. Some people believe that cyber-stalking is an intrusion but not a physical threat which is not necessarily true. A potential stalker may not be comfortable in a face-to-face confrontation but will not hesitate to use electronic communications to harass the victim. Who is the Cyber-stalker? Most of the stalkers are men with the victims being women. In many of the cases documented, the cyber-stalker and the victim had a prior relationship that ended bitterly. However, there also have been many instances of cyber-stalking by strangers. With the enormous amount of personal information available through the Internet, a cyber-stalker can easily locate private information about the victim with a few clicks of the mouse. With the Internet offering anonymity, a cyber-stalkers identity can be concealed. Knowing that they may not ever be identified, the cyber-stalker might carry the harassment further by contacting the victim incognito. Who is the victim? The victims can be of any age and gender. In physical stalking, the perpetrator and the victim are located in the same geographic area but in cyber-stalking the perpetrator can be on the other side of the globe. Perpetrators obtain personal information about the victim through the Internet. Methods of contact: Live Chat or IRC (Internet Relay Chat): where a user talks live with other users, a common place for cyber-stalking. One incident involved a 13 year old girl who entered a teen chat room and engaged in a conversation with a user who identified himself as another teenage female. For the sake of a short story the victim was followed from softball practice to her home and raped. The perpetrator was caught and gave the police the details of how easy it was to find the victim a state away from him. Although the victim didnt give information such as name, address, etc., she did give clues that lead the perpetrator right to her. After 30 minutes of chatting, he learned that she had softball practice every Tuesday and Wednesday after school, her team wore navy shirts, her jersey number was 22, she was the catcher, her team name was Falcons, her hair was long and blond, she was an only child and that her parents didnt get home until 6:00 pm through the week. There was only one thing left to learn, what city? Since the perpetrator was able to gain her trust through the common ground of softball, he simply asked her what city she lived and she immediately replied. All he had to do was check the city directory on the net for recreational sports and find which school falcon players attended, since the city recreation teams are formed according to school districts. He showed up at her school and followed the girls to softball practiced, looked for jersey #22, and followed her home without her even noticing. Message boards and newsgroups: a user converses with other users by posting messages and responding to them. Sometimes the perpetrator has a strong opinion on a subject matter that strongly differs from the potential victim. A cyber-stalker can use bulletin boards to encourage third party harassment. Jayne Hitchcocks cyber-stalker found her through writers newsgroup on the Internet. The controversy began when the cyber-stalker got angry at a statement Jayne published on the newsgroups bulletin. Her cyber-stalker sent sexually explicit emails with forged addresses to look like they came from her. One of the emails contained her home phone number and address. Another stated that she was interested in sedo-sexual fantasies. The cyber-stalker didnt stop with Jayne he sent emails to her husband, her literary agent and colleagues. Jayne was mail-bombed as was her friends and family. Jayne is now the president of WHOA (Working to Halt Online Abuse), a support group for cyber-stalking victims. In a similar case, a woman in Hollywood rejected advances made by a security guard she met at church. Gary Dellapenta got back at her through the Internet. He posted personal ads using her name that described her fantasies of being raped by an intruder in her home. Six times over the next few months men showed up at her home to make her fantasy come true. Gary Dellapenta was sentenced to six years in prison. He was the first person jailed for cyber-stalking. IRC and Newsgroups, are common ground for new exploits and viruses. Its where hackers meet to scan IP addresses and help each other hack systems. Important steps with using IRC: (Windows-specific)
Email: a user writes to anyone about anything and can also attach files to the email containing pornographic pictures, viruses, or other damaging executables such as a Trojan horse. A student from the University of San Diego sent hundred of violent and threatening emails to five female schoolmates over the course of a year. When that didnt get the girls attention, he sent them executables disguised as jpeg files that destroyed their hard drives. A Trojan horse is an executable program that damages data, files or hard drives. A Windows executable has extensions ("bat", "pif", "scr", "lnk", etc.). A Trojan can hide by having more than one extension. Only the last extension counts so a Trojan can hide the last extension and look something like this pretty.jpg.exe. Remember the "Love Letter for You" Trojan? Even though users didnt recognize it, their human instinct took over and they opened it. Bad decision. Remember to unhide extensions. If you do get a Trojan, you can get fix instructions on the Internet. One site I have used is: http://www.irchelp.org/irchelp/security/. Data brokers are people who sell information that they get mostly through government records. They sell social security numbers, employer name and address, and financial information. For a small fee they will give information that is buried in government databases to anyone who pays. Amy Boyer was a dental assistant in New Hampshire who was killed in 1999 by a man that paid $45 for information used to track her down and kill her. Ms. Boyer was 20 years old her assailant first paid the Florida firm Docusearch for her social security number. Then he bought her employer name and address from them. Ms. Boyer was killed at work. Laws State and federal laws on cyber-stalking are few and weak however there are strides being made. California recently amended its stalking law to also cover cyber-stalking. Gary Dellapenta was the first person tried and prosecuted under the newly amended stalking law in California. Less than one third of the states have laws that cover stalking through the use of the Internet. Although the federal government has passed laws concerning cyber-stalking, the first amendment protects harassment via electronic communication. By definition, stalking via the Internet is not a crime. The conduct of the stalker has to be defined by a definite set of acts directed at the potential victim before a crime is actually committed. The first amendment and other legal considerations basically protect a cyber-stalker that harasses, threatens, and forces himself into the life of the victim. Under the federal law, 18 U.S.C. 875, it is a federal crime to transmit communication containing a threat to injure or harm another person when the communication device is the Internet, email, or beepers. The burden of proof of such an act is the sole responsibility of the potential victim. The anonymity of the Internet and the lack of direct contact between the cyber-stalker and the victim make it difficult for law enforcement to identify, locate, and arrest the offender. Many law enforcement agencies have created special task forces to deal with cyber-stalking. The problem is lack of proper training and technical expertise in local and federal agencies. According to WHOA, most cases of cyber-stalking are not reported to law agencies because the victim cant identify the perpetrator. Evidence from support groups supports that cyber-stalking is a growing problem in the Unites States. Currently there are more than 90 million people with access to the Internet. Ten million of those people are children. The Los Angels District Attorneys office estimates that 20% of the cases reported to their Stalking Unit were cyber-stalking cases. In New York City, the unit of Computer Investigations and Technology reports that approximately 40% of their caseload for the last few years involve cyber-stalking crimes. One ISP reported that in the last year 15 complaints per month are due to cyber-stalking. The same ISP also reported that they received virtually no such complaints one year ago. So what can we do?
What if you are a victim?
Online Harassment Statistics for 2000 Resolution of Cases
Of the cases resolved in 2000:
Its evident that cyber-stalking is going to increase as fast as Internet accessibility does. It has become a serious threat and should be treated as such. Take the necessary steps to protect your privacy while on the Internet. References CYBER-STALKING, A Real Life Problem WHOA "Cyber Stalking: Are You at Risk?" Security
World.com Cohen, Adam. "Internet Insecurity". Time Magazine. July 2, 2001"45-51. Hartman, Rachel R. "Cyber-stalking and Internet Safety
FAQ" 1999 REPORT ON CYBER-STALKING: A NEW CHALLENGE FOR LAW
ENFORCEMENT AND INDUSTRY Spencer, Susan. An Online Tragedy. CBS News |
||||||||||
|
to top of page | to Threats & Vulnerabilities | to Reading Room Home
|
||||||||||
![]() |
||||||||||