preview

Cyberstalking Case

Decent Essays

Investigating a cyberstalking case presents a unique set of challenges. Evidence can be found in digital form, so it can be protected from being lost or damaged, or the complete opposite can be true and it can be easily lost, damaged, corrupted, or rendered inadmissible in court due to flawed forensic gathering practices. It is important, with cases involving digital media that the same procedures be followed when it comes to collecting evidence. Chain of custody documentation must still be kept. The right software must be used to directly copy any hardware seized or searched for investigative purposes. The first step in a cyberstalking investigation, just like most other criminal investigations, involves interviewing the victim. Even if the …show more content…

Obtain copies of e-mails, text messages, social network posts, etc. These may be able to be trace back to the sender, and can also help lead investigator to the source of the connection between victim and stalker. If investigators can find out why or how the victim was chosen, it may be possible to find more victims, who have yet to report the problem, or it could also vastly narrow down the search for suspects. It may be possible to trace e-mail messages by their IP address, and a suspect ISP can be subpoenaed to provide records of their internet history. Text messages and Phone calls are time stamped and a mobile phone or landline service provider can be subpoenaed for call histories and text logs. If the stalker is determined to avoid detection, of course there are steps they can take to counteract these types of investigations. The suspect can use VPNs or public Wi-Fi hotspots to send e-mails, disposable burner phones for texts, or anonymous computer programs capable of sending texts and attachments. This also makes finding the connection to the victim as well as the probable cause for the harassing behavior so vital, it can be the main thing that gets the suspect caught. Even if all those above steps are taken to avoid detection, investigators would still be able to gather evidence if the suspect was under surveillance or his internet communication was being monitored and

Get Access