Work of William Fiscus III.

Monday, October 5, 2015

1. Define online harassment
·         Fully 73% of adult internet users have seen someone be harassed in some way online and 40% have personally experienced it, according to a survey by Pew Research Center. (Duggan, 2014)

Minor online harassment – involves less severe offenses of online harassment which includes name calling and embarrassment.

Severe offenses of online harassment – Target of physical threats, harassment over a long period of time, stalking, and sexual harassment.

2. Discuss federal laws regarding cyber stalking/threats.
On the federal level:
18 USC 875 Section C – says violator of cyber threats shall be fined or imprisoned not more than 5 years, or both.
47 USC 223 – fills in the gaps of the above law, however it doesn’t include social media, forums, and email.

3. Discuss steps to prevent/handle cyber stalking.
·         Never post address or phone number publicly.  Always use caution when inputting any personal information.
·         Don’t post current location when posting.
·         Always use strong, unique passwords.
·         When making a handle online don’t include name or birthday
·         Reset all passwords when going through a breakup.
·         The biggest preventive step taken should be to trust your instincts.

·         Contact law enforcement if you are a victim.

·         Do not communicate with stalker

·         Keep all evidence

·         Develop a safety plan specific to your situation.

4. Find a case of cyber stalking and write a brief description of the case.
“Stonewall man jailed for allegedly cyber stalking ex-girlfriend”

Description: 

42-year-old Scott Bailey was arrested in Desoto Parish and booked into Caddo Correctional Center.  In the case Bailey was advised by the Sheriff’s Department to cease communication with his ex-girlfriend, but he ignored them.  He was calling/texting and sending Facebook messages on average 15-20 times a day at all hours and contained harassing, vulgar, and sexual messages. His bond was set to $100,000.
(ktbs, 2015)

5. Find a civil case related to computer crimes and write a description of the case.
United States v Noval 

Description:  

The ruling that breaking a TOS was totally okay and not a crime (Chan, 2012)
 The 9th circuit also stated it being illegal when a minor uses google/or when a user gives someone his/her Facebook password.
The ruling stated violation of corporate policy not equivalent to federal computer crime.

6. Find at least one incident of cyber terrorism and write a description of the incident.
October 2012:

 Russian firm Kaspersky discovered a worldwide cyber-attack dubbed “Red October” that had been operating since 2007.

Vulnerabilities in Microsoft Word and Excel programs were used primarily targeting countries in Eastern Europe, Former USSR and Central Asia, although Western Europe and North America reported victims as well.  The information collected from government embassies, research firms, military institutions, energy providers, and nuclear and other critical infrastructures. (NATO, 2015)



References
Chan, C. (2012, April 12). It's Not a Crime to Break a Terms of Service Agreement (So It's Okay to Never Read Them). Retrieved August 8, 2015, from http://gizmodo.com/5901339/its-not-a-crime-to-break-a-terms-of-service-agreement-so-keep-on-not-reading-them

Duggan, M. (2014, October 22). Online Harassment. Retrieved August 7, 2015, from http://www.pewinternet.org/2014/10/22/online-harassment/
Stonewall man jailed for allegedly cyber stalking ex-girlfriend. (2015, July 23). Retrieved August 7, 2015, from http://www.ktbs.com/story/29617180/stonewall-man-jailed-for-allegedly-cyber-stalking-ex-girlfriend
The history of cyber attacks - a timeline. (n.d.). Retrieved August 8, 2015, from http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm

1 comment :

  1. Hey Willie did you read these to your Dad way back then?

    ReplyDelete

William Fiscus III 2015. Powered by Blogger.

Popular Posts