Law Enforcement And Cyberstalking Term Paper

Excerpt from Term Paper :


Cyber-Crime in a New Age of Law Enforcement

With the new introduction of the online sphere, law enforcement today faces unique challenges those previous generations could never even imagined. The internet allows the ability to create an online presence that has virtually no relevance to the real world character of the user. People can now create an online presence with the ability to construct a range of pseudonymity that was never before possible (Gyorgy, 2002). Therefore the person that you think you are communicating with may be a different person altogether.

Furthermore, people can set up a range of different personalities and have multiple identities online that they can use for a range of malicious activities. For example, it is possible for an elderly man who has perverted tendencies to portray himself as a young school girl on online chat forums. In these arenas there is seldom any verification process to unsure the users are who they say they are. However, the use of such pseudonymity often leads people to quickly imagine all the negative and dangerous uses of these fake profiles. Although most of these profiles can be harmless, others can be used for ill intent.

The users that use online spaces for crimes...
...Target's chief financial officer, John Mulligan, told a congressional committee in February that the company began investigating Dec. 12, when the U.S. Justice Department warned the company about suspicious activity involving payment cards; about 40 million payment card records were stolen from the retailer, along with 70 million other records with customer information such as addresses and telephone numbers (Jayakumar, 2014). The enormity of this type of identity theft makes it incredibly difficult to provide safe access for future users and the opportunities for identity theft based on this attack are virtually endless.

It is not only the private sector that is currently having problems with cybersecurity. WikiLeaks has become of closely watched organization in the last few years because of its release of hundreds of thousands of classified government documents that show everything from diplomatic cables to videos of war crimes being committed. The stated purpose of the organization is to provide more transparency in the world; especially in regards to public officials. In a response to a question posed by Chris Anderson in a TED interview, Julian Assange offered this response when asked how he would justify releasing damaging information about someone's family member (TEDGlobal, 2010):

JA: Yeah, we do get a lot of that. But remember, the people in Baghdad, the people in Iraq, the people in Afghanistan -- they don't need to…

Sources Used in Documents:

Works Cited

Gyorgy, P. (2002). The Tale of Cookies (Dr. Jekyll and Mr. Hyde). Social Research, 239-245.

Jayakumar, A. (2014, March 13). Target looking into response to cybersecurity breach; retail sales rose in Feb. Retrieved from The Washington Post:

TEDGlobal. (2010, July). Julian Assange: Why the world needs WikiLeaks. Retrieved from TED:

TEDGlobal. (2012, July). Michael Anti: Behind the Great Firewall of China. Retrieved from TED:

Cite This Term Paper:

"Law Enforcement And Cyberstalking" (2014, March 14) Retrieved March 7, 2021, from

"Law Enforcement And Cyberstalking" 14 March 2014. Web.7 March. 2021. <>

"Law Enforcement And Cyberstalking", 14 March 2014, Accessed.7 March. 2021,