Lecture 4-Cyberstalking
Lecture 4-Cyberstalking
Cyber- Blackmailing/Extortion
wiredsafety.org
The world’s largest online safety and help group, including:
– WiredPatrol.org
– WiredKids.org
– Cyberlawenforcement.org
Provides education, awareness and one-to-one help when things go
wrong online
Assists and trains law enforcement in cyber-investigations
All unpaid volunteers, and conducted entirely online
Run by cyberlawyer, Parry Aftab
An obvious trend we observed the use of social networking sites and online chat
applications, as platforms to conduct various malicious activities to-wards victims,
be it an individual, a brand or even an organization. This includes fake profiles,
cyber extortion, scams, click-jacking, doxing, elicitation and phishing.
Publicly available databases and social media websites can be used for doxing.
Clickjacking is an attack that tricks a user into clicking a webpage element which is
invisible or disguised as another element. ... The invisible page could be a malicious
page, or a legitimate page the user did not intend to visit – for example, a page on
the user's banking site that authorizes the transfer of money.
18% 20%
MALE
FEMALE
UNKNOWN
62%
A Typical Victim
Male or female depending on the age group
– in 18 – 32 year olds, females predominate
Often involved in a real or imagined romantic or sexual
relationship
May be a member of a targeted minority group or special
group
– ethnic, racial and religious minorities
– gays and lesbians
– cancer or other patients with serious illnesses
– adoptive or birth parents
– political or special interest group
Statistics for age of group complainants for 2016 to
2020
Percentage of Victims by Gender/Age Groups
40%
30% MALE
20% FEMALE
10%
0%
+
32
55
24
42
8
55
r1
-
de
18
25
33
43
Un
Methods Used
E-mail and instant messaging direct threats
Identity theft
Building websites targeting the victim
Posting false profiles
Hacking
Posting fake sex ads
Pasting the victim’s image onto a pornographic image or
posting real sexual images of the victim online
Provoking attacks against the victim by others
Posing as the victim and attacking others
Contacting victim’s family or employer
Posting in a newsgroup or on a bulletin board, online
Following the victim from site to site
Cyber harassment cases in Malaysia
Cyberstalking Statistics
(2018)
Case Factors
16%
27%
Physical threats
13% Hacking
Child exploitation
7% Other
Unknown
37%
Trends
More women are cyberstalking others than ever before
In some age groups, men are the greatest percentage of
victims
More children are cyberstalking each other
Certain ethnic groups are being targeted, especially from
the Middle East
More people are Cyber-dating, and becoming victims of
cyberstalking when things don’t work out
Technology, such as trojan horses, are used more often
than before...giving the cyberstalkers a remote control to
your own computer!
Law enforcement is taking action more often
Most countries now have laws criminalizing cyberstalking
and harassment.
Cyberstalking Statistics
(2001 – 2002)
Gender of Offenders
120%
100%
25%
80% 40%
60% FEMALE
40% 75% MALE
60%
20%
0%
2001 2002
Note: 25% of offenders are personally known by their victims
Cyberstalking Prevention
Don’t share personal information online
Don’t fill out profiles or include personal information on
websites
Don’t use a gender specific or provocative screen name or
e-mail address
Don’t flirt or start an argument online unless you are
prepared for the consequences
Don’t share your password with anyone
When cyberdating, set up a special e-mail address
Use a good anti-virus program and update daily
When Bad Things Happen
Don’t reply to your cyberstalker
Save all communications on your computer
If there is any indication that they have your offline
information, call the police!
If they threaten physical violence to you or your family,
call the police!
Cyberstalking is a serious matter, take it seriously!
If your law enforcement agency needs help, have them
contact WiredSafety.org
Forewarned is forearmed –
Google Yourself! (and your kids)
Go to Google’s search engine, www.google.com
Type in your first and last name in “quotes” (for example “Parry
Aftab”)
Type in your telephone address next (no spaces, using dashes one time
and parentheses the next)
Type in your full street address, in “quotes”
Note all sites and URLs that contain your personal contact information
Contact those sites and ask them to remove your information
Case #1: Perpetrator creates a fake Facebook profile by using
victim’s personal photos and family. Then, harasser posted
other unnecessary photos and bad statement in Facebook wall
to defame victim.