Translate

Thursday, May 19, 2011

How cyber stalkers Obtain Your Personal Information Laws Lag Behind Technology Making Prosecution Difficult


Today anyone can conduct an internet search typing in such key words as:
  • license plate records
  • people locate
  • employment locate
  • bank account locate
  • employment locate
  • phone record trace
  • social security number trace
  • property records information
Searching with these words will bring up hundreds of internet-based data furnishing companies that supply consumer records online. Some even provide these types of records for free. Experiment a little and you'll quickly discover that you don't need to hire a private investigator to obtain personal information; with a little ingenuity and the help of the internet, you can find it yourself.

Internet-based information brokerages and data furnishing companies are surfacing all over the country. The information age has created a new revenue source for those who provide consumer records. Data furnishing is a billion dollar industry that includes the three national credit bureaus, companies like Lexis Nexis, Accurint, Choicepoint and the thousands of others that pop up daily. All provide consumer private records with the click of a mouse.

Currently, a convicted felon in California is operating one of the nation's largest information brokering businesses. Yet the hands of local law enforcement are tied because information brokers are neither licensed nor regulated nearly as well as they should be. Simply stated, anyone at any time can hire one of these data furnishing agents or an information broker and obtain data that the majority of us believe is private.

In California, legislation has been introduced that will mandate licensing of all information brokers that sell a Californian's private records and information to a third party. Such licensing is not presently in place, enabling many of these so-called information brokers' practices to remain unnoticed by law enforcement and our nation's law makers.

Over the years members of the justice department, local and state law enforcement including the FBI and political figures have all express concern over this subject and are exasperated over the lack of laws governing cyber stalking. But they all have had the same response: They aren't aware of anything that protects people's records. Most of the time they shake their heads and say it's crazy how easy it is to get access to personal information on the internet.

A Dangerous Trick - Caller ID Spoofing
Many people erroneously believe they are safe from cyberstalking because they are rarely online. But technology has extended beyond the reach of the computer and where technology goes, cyber stalkers can follow.

Caller ID spoofing is simple to do.
Google the topic and you'll instantly locate sites where you can purchase the technology yourself. By buying pre-paid time, you can then call someone else, changing the number and the name you're calling from on their call display. The person picks up the phone thinking they're talking to National Bank, and instead it's a stalker after personal information. Using these tricks, cyber stalkers can locate victims by fooling friends and relatives into revealing the victim's whereabouts. Or they can obtain critical personal information to access a victim's private records.

In one case, a woman received two texts from what purported to be her bank, asking for personal information. She responded without thinking about it, only to find out later that someone broke into her bank account and paid all of her bills several times. Nothing that could be proven as "stolen". As far as the bank was concerned she was the one who chose to pay bills several times. But it left her completely broke until her next payday -- over two weeks away. Even worse, now an identified person had her social security number and other key pieces of information that allowed him to do it again. And there was nothing she could do to have him arrested.

Legislation banning caller ID spoofing has been created and passed in the House and referred to the Senate, but as of this writing it has gone no further. Until laws are on the books banning the sale of caller ID spoofing technology, it is simple to purchase this technology anonymously online.

The Murphy Case: One Example of Cyberstalking in the Courts 
 
Seattle is one of the few places that has created a cyberstalking law, thanks to the diligence of US Attorney Kathleen Warma and the FBI. Joelle Ligon -- one of the savviest survivors -- persisted in her fight though her cyberstalker sent harassing emails, put up fake ads in her name saying she wanted sex, questioned her legitimacy at her workplace, and endless other torments. He turned out to be an ex that she had broken up with 14 years earlier.

Warma, after being turned down twice for a warrant, researched a little-used 1997 amendment to the Federal Telecommunications Act that outlaws online harassment. She built a case of 26 felony counts against Robert James Murphy.

They caught a break when Ligon emailed Murphy to ask if it was him threatening her, and he responded, "No it wasn't." Stupidly Murphy sent that message from the exact same computer he'd used when posting and emailing threats. Once they had his computer, they had him cold.

It took the FBI office literally thousands of man hours to investigate. Warma has said that to be successful there had to be a very determined investigative team, prosecutor and victim to secure a conviction simply because the nation's laws are antiquated and there is not a set protocol to date for prosecuting cyberstalking cases involving the use of technology.

While many cyber stalkers never see a day in court, Ligon successfully lobbied for a cyberstalking law in Seattle and saw her tormentor fined, assigned to community service and given five years probation. It's a bittersweet ending that her tormentor didn't see jail time, even with the help of a US Attorney and the FBI. But Ligon at least had the satisfaction of obtaining closure in her cyberstalking case and an acknowledgment of wrongdoing.

Most cases don't get this far.


No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)