Skip to main content icon/video/no-internet

The Internet provides individuals throughout the world with the ability to easily communicate with others. Most people use the Internet as a tool to engage in legitimate tasks, but some engage in illegal behavior on-line. Because it is easy to hide one's identity on the Internet, individuals who commit crimes in “cyberspace” are often difficult to locate. Law enforcement officers have had to throw out conventional methods and find new ways to curtail Internet crime. Cyberstings are undercover operations conducted to apprehend individuals who victimize others through use of the Internet.

Appropriate Circumstances for Cyberstings

Many criminals have been investigated by use of cyberstings, including murderers, stalkers, extremists, solicitors of fraud, gamblers, and those who deal in the black market sale of babies. Most commonly, however, law enforcement officers target sexually deviant behavior, including involvement in prostitution rings, child pornography rings, and child molestation. Individuals who operate and/or participate in prostitution and child pornography Web sites use screen names and passwords and feel confident that law enforcement will not detect them. Furthermore, the ability of the Internet to transmit data in an instant provides immediate gratification for deviant appetites of sex offenders.

Child molesters and pedophiles use the Internet as an avenue to communicate freely and anonymously with minors in sexually explicit ways. They can search for victims by accessing member profile information as it is available from various Internet companies, including America Online. Parents often do not know what their children are looking at or with whom they are communicating while they are on the Internet, and even if they are told, the perpetrators' identities are still unknown.

Cybersting Techniques

Depending on the type of case and situation, law enforcement officers use a variety of techniques when conducting cyberstings. Officers go on-line in an undercover capacity and conduct targeted investigations, arrange for buy/bust meetings with offenders, cruise the Internet for identification and apprehension purposes, or create their own Web sites to attract suspects.

Targeted Stings

Investigators commonly conduct targeted sting operations, which occur when a report is made to law enforcement regarding a crime that has occurred on the Internet. The investigator may acquire a user name and other information from the informant or victim of the crime and then pose as that individual while “chatting” on-line to further attract the perpetrator. In some cases, the victim actually chats with the offender under officer supervision. In this case, the officer or victim will attempt to get information necessary for a successful criminal prosecution of the offender. After the offender feels comfortable enough with the situation, a meeting is set up in which the offender is arrested. These targeted operations typically occur in cases of sex-based dialogue with children, fraud, and prostitution rings.

One example of a targeted sting occurred in 2002, when the FBI set up a cybersting called “Operation Candyman.” The FBI had been investigating a child pornography Web site that consisted of a membership of individuals who traded ideas and photos regarding the sexual abuse of children. An undercover FBI agent joined the Candyman Web site and participated in the exchange of information with Candyman's members. As a result of the information collected, subpoenas were issued to Internet providers for registration and user information; at least 89 people in 26 states were arrested, including a member of the clergy, a nurse, a school bus driver, and a member of law enforcement. The Candyman Web site had an estimated 7,000 members from at least 10 countries.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading