1.
Define online harassment
·
Fully 73% of adult internet users have
seen someone be harassed in some way online and 40% have personally experienced
it, according to a survey by Pew Research Center. (Duggan, 2014)
Minor online harassment
– involves less severe offenses of online harassment which includes name
calling and embarrassment.
Severe offenses of
online harassment – Target of physical threats, harassment over a long period
of time, stalking, and sexual harassment.
2.
Discuss federal laws regarding cyber stalking/threats.
On the federal level:
18 USC 875 Section C –
says violator of cyber threats shall be fined or imprisoned not more than 5
years, or both.
47 USC 223 – fills in
the gaps of the above law, however it doesn’t include social media, forums, and
email.
3.
Discuss steps to prevent/handle cyber stalking.
·
Never post address or phone number
publicly. Always use caution when
inputting any personal information.
·
Don’t post current location when
posting.
·
Always use strong, unique passwords.
·
When making a handle online don’t
include name or birthday
·
Reset all passwords when going through a
breakup.
·
The biggest preventive step taken should
be to trust your instincts.
·
Contact law enforcement if you are a
victim.
·
Do not communicate with stalker
·
Keep all evidence
·
Develop a safety plan specific to your
situation.
4.
Find a case of cyber stalking and write a brief description of the case.
“Stonewall man jailed
for allegedly cyber stalking ex-girlfriend”
Description:
42-year-old Scott
Bailey was arrested in Desoto Parish and booked into Caddo Correctional
Center. In the case Bailey was advised
by the Sheriff’s Department to cease communication with his ex-girlfriend, but
he ignored them. He was calling/texting
and sending Facebook messages on average 15-20 times a day at all hours and
contained harassing, vulgar, and sexual messages. His bond was set to $100,000.
(ktbs, 2015)
5.
Find a civil case related to computer crimes and write a description of the
case.
United States v Noval
Description:
The ruling that
breaking a TOS was totally okay and not a crime (Chan, 2012)
The 9th circuit also stated it
being illegal when a minor uses google/or when a user gives someone his/her
Facebook password.
The ruling stated
violation of corporate policy not equivalent to federal computer crime.
6.
Find at least one incident of cyber terrorism and write a description of the
incident.
October 2012:
Russian firm Kaspersky discovered a worldwide
cyber-attack dubbed “Red October” that had been operating since 2007.
Vulnerabilities in
Microsoft Word and Excel programs were used primarily targeting countries in
Eastern Europe, Former USSR and Central Asia, although Western Europe and North
America reported victims as well. The
information collected from government embassies, research firms, military
institutions, energy providers, and nuclear and other critical infrastructures.
(NATO, 2015)
References
Chan, C. (2012, April 12). It's Not
a Crime to Break a Terms of Service Agreement (So It's Okay to Never Read
Them). Retrieved August 8, 2015, from
http://gizmodo.com/5901339/its-not-a-crime-to-break-a-terms-of-service-agreement-so-keep-on-not-reading-them
Duggan,
M. (2014, October 22). Online Harassment. Retrieved August 7, 2015, from http://www.pewinternet.org/2014/10/22/online-harassment/
Stonewall
man jailed for allegedly cyber stalking ex-girlfriend. (2015, July 23).
Retrieved August 7, 2015, from http://www.ktbs.com/story/29617180/stonewall-man-jailed-for-allegedly-cyber-stalking-ex-girlfriend
The history of cyber attacks - a
timeline. (n.d.). Retrieved August 8, 2015, from
http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm
Hey Willie did you read these to your Dad way back then?
ReplyDelete