top of page
 

 

 

 

 

 

 

 

This is one of the more difficult pages for me to compile.  Personally I ended up with no help from any attorney nor law enforcent, but i did make the reports and i did beg for help.  The problem in my home town is that there isn't a cyber unit for the local police department and the FBI needs to have a very specific criteria met in order for them to investigate cyber crimes.  The need for more education in the police force became abundantly clear as well as an increase in staff.  Things are changing and will continue to change as long as the public demands to see change.  Instead of dwelling on what should have been in my case, it is time to focus on the future and to make sure that this doesn't happen to our children.

 

 

 

 

 

 

Title. Double click me.

Title. Double click me.

Cyberstalking and Prevention.

This is a must read for law enforcement.  It was written in 1999 and predicted the problem we have today.

 


 

finding laws to charge for misuse.

Cops guide for stalking p053

Supervising stalking offenders

Ip Spoofing

How to track text messages online.

Stalking-problem-oriented-Police-

Cell Phone Location tracking tipsheet.

Model Stalking -code.

Img src.

Revenge porn

The pursuit of the digital criminal

Guide for police to investigate

Cyberstalking and Law enforcement

Stalking oriented policing

Law enforcement and cyberstalking.

Privacy

Itunes forensics

Digital+trust report.

Social Media scanning.

Analyzing stalking statute.

Hackers.

 

 

 

 

 

Technology outpaces laws.

 

26 percent of women have been stalked online.

The first ammendment

 

Privacy rights

 

 


 

The laws are in place in every state to protect victims of cyberstalking and digital abuse.  The technology changes and improves daily making it very difficult for law enforcement to investigate these crimes.  The best thing a victim can do is keep accurate logs and evidence for the officers as well as a journal of the emotional effect that this abuse is having on them.  There will be a day soon where the perpetrators will be held accountable.  Lets find the solutions and work together.

 

 

“There may be times when we are powerless to prevent injustice, but there must never be a time when we fail to protest.”
Elie Wiesel

 

 

Title. Double click me.

 

 

 

Educators guide to cyberbullying

alb 14471

Threats on Facebook

The obsessive x

News

Technology and Stalking

Cases

Nova Labs CYbersecurity

Dangers of the informaion

superhighway.

Cybersecurity

The hacking laws in the US computer fraud act  1986.

The role of local law enforcement.

Digital Stalking Guide.

Maker of the Stealth Genie arrested

 

 


 

Cyberstalker Gets Arrested

 

Cases

 

White Collar Crime News

 

North Carolina Case

 

14471 pdf

 

Analyazing stalking Laws

 

Arrests increase with social media

"If your actions inspire others to dream more, learn more, do more and become more, you are a leader.   John Quincy Adams

 

 

 

"Leadership and learning are indispensable to each other."
              john Kennedy

 

 

 

"Anyone who doesn't take truth seriously in small matters cannot be trusted in large ones either."

 Albert Einstein

.“There will come a time when it isn't 'They're spying on me through my phone' anymore. Eventually, it will be 'My phone is spying on me'.”
― Philip K. Dick

 

 

Resources and information for Law enforcement and attorneys about technology and the changing landscape of domestic abuse.

 

There are many reasons that non many attorney's will take domestic cyber crime cases, but the main reason is becasue they are so difficult to prove.  Here are some articels that have good solid information about the battle that attorney's face, also about some of the cases that have been tried and won.  The same way that phone numbers can be spoofed, so can IP address.  There is also an application called TOR which gives the person an annoymous IP address and protects the users identity.  This can be a good thing for a victim of domestic abuse, but not if they are cyberstalked.

The Scales of Justice...

Title. Double click me.

Hacking Laws that Have Been Abused

US Computer Fraud and Abuse Act of 1986

FACEBOOK VULNERABILITY LEAKS PHOTOS

How to perform

forensics analysis 

using log data

AIR HOPPER-USING FM SIGNAL TO HACK

Song of the Day

bottom of page