NCJ Number
              203759
          Journal
  Police Chief Volume: 70 Issue: 12 Dated: December 2003 Pages: 16-26
Date Published
  December 2003
Length
              10 pages
          Annotation
              This article discusses the elements of cyberstalking and how it is policed.
          Abstract
              Most States currently have laws against cyberstalking due to the huge increase of technology in our daily lives. These laws on cyberstalking vary depending on the State and may be difficult to enforce. The article begins with a case study of a cyberstalking incident that occurred between 1998 and 2001 that is meant as a cautionary tale of not only how vulnerable people are to cyberstalkers, but also of how difficult it is to legally pursue a cyberstalking criminal case. The common elements necessary to bring cyberstalking charges against a suspect are outlined and include means, specific person, intent, and transmission. The various forms of cyberstalking are described, such as sending inappropriate electronic greeting cards and sending viruses to the victim’s computer. Steps toward resolution of the cyberstalking incident are offered, such as complaining to the Internet service provider or simply cease responding to chat room messages posted by the cyberstalker. Next, the steps involved in the police investigation of cyberstalking are offered and include obtaining a detailed description of the harassing behavior from the complainant and determining if any physical contact has been initiated by either the complainant or the harasser. Shortcuts are offered for police officers attempting to uncover the identity of a cyberstalker, such as conducting an Internet search of newsgroups with the harassers e-mail address to see if the harasser has posted their name or telephone number with any Web sites. The anonymity currently offered by the Internet offers many hiding places for cyberstalkers and makes tracing suspects difficult for law enforcement personnel. Advice for the public is offered in order to keep safe from cyberstaking and many on-line resources for officers tracking cyberstalkers are presented. Endnotes
          