Law Enforcement and Cyberstalking Term Paper

Total Length: 895 words ( 3 double-spaced pages)

Total Sources: 3

Page 1 of 3

Cyberstalking

Cyber-Crime in a New Age of Law Enforcement

With the new introduction of the online sphere, law enforcement today faces unique challenges those previous generations could never even imagined. The internet allows the ability to create an online presence that has virtually no relevance to the real world character of the user. People can now create an online presence with the ability to construct a range of pseudonymity that was never before possible (Gyorgy, 2002). Therefore the person that you think you are communicating with may be a different person altogether.

Furthermore, people can set up a range of different personalities and have multiple identities online that they can use for a range of malicious activities. For example, it is possible for an elderly man who has perverted tendencies to portray himself as a young school girl on online chat forums. In these arenas there is seldom any verification process to unsure the users are who they say they are. However, the use of such pseudonymity often leads people to quickly imagine all the negative and dangerous uses of these fake profiles. Although most of these profiles can be harmless, others can be used for ill intent.

The users that use online spaces for crimes are often hard to catch and these crimes can often occur on a massive scale. Target's chief financial officer, John Mulligan, told a congressional committee in February that the company began investigating Dec. 12, when the U.S.

Stuck Writing Your "Law Enforcement and Cyberstalking" Term Paper?

Justice Department warned the company about suspicious activity involving payment cards; about 40 million payment card records were stolen from the retailer, along with 70 million other records with customer information such as addresses and telephone numbers (Jayakumar, 2014). The enormity of this type of identity theft makes it incredibly difficult to provide safe access for future users and the opportunities for identity theft based on this attack are virtually endless.

It is not only the private sector that is currently having problems with cybersecurity. WikiLeaks has become of closely watched organization in the last few years because of its release of hundreds of thousands of classified government documents that show everything from diplomatic cables to videos of war crimes being committed. The stated purpose of the organization is to provide more transparency in the world; especially in regards to public officials. In a response to a question posed by Chris Anderson in a TED interview, Julian Assange offered this response when asked how he would justify releasing damaging information about someone's family member (TEDGlobal, 2010):

JA: Yeah, we do get a lot of that. But remember, the people in Baghdad, the people in Iraq, the people in Afghanistan -- they don't need to….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Law Enforcement And Cyberstalking" (2014, March 14) Retrieved April 27, 2024, from
https://www.aceyourpaper.com/essays/law-enforcement-cyberstalking-185057

Latest MLA Format (8th edition)

Copy Reference
"Law Enforcement And Cyberstalking" 14 March 2014. Web.27 April. 2024. <
https://www.aceyourpaper.com/essays/law-enforcement-cyberstalking-185057>

Latest Chicago Format (16th edition)

Copy Reference
"Law Enforcement And Cyberstalking", 14 March 2014, Accessed.27 April. 2024,
https://www.aceyourpaper.com/essays/law-enforcement-cyberstalking-185057