Entry
Reader's guide
Entries A-Z
Subject index
Cyberstings
The Internet provides individuals throughout the world with the ability to easily communicate with others. Most people use the Internet as a tool to engage in legitimate tasks, but some engage in illegal behavior on-line. Because it is easy to hide one's identity on the Internet, individuals who commit crimes in “cyberspace” are often difficult to locate. Law enforcement officers have had to throw out conventional methods and find new ways to curtail Internet crime. Cyberstings are undercover operations conducted to apprehend individuals who victimize others through use of the Internet.
Appropriate Circumstances for Cyberstings
Many criminals have been investigated by use of cyberstings, including murderers, stalkers, extremists, solicitors of fraud, gamblers, and those who deal in the black market sale of babies. Most commonly, however, law enforcement officers target sexually deviant behavior, including involvement in prostitution rings, child pornography rings, and child molestation. Individuals who operate and/or participate in prostitution and child pornography Web sites use screen names and passwords and feel confident that law enforcement will not detect them. Furthermore, the ability of the Internet to transmit data in an instant provides immediate gratification for deviant appetites of sex offenders.
Child molesters and pedophiles use the Internet as an avenue to communicate freely and anonymously with minors in sexually explicit ways. They can search for victims by accessing member profile information as it is available from various Internet companies, including America Online. Parents often do not know what their children are looking at or with whom they are communicating while they are on the Internet, and even if they are told, the perpetrators' identities are still unknown.
Cybersting Techniques
Depending on the type of case and situation, law enforcement officers use a variety of techniques when conducting cyberstings. Officers go on-line in an undercover capacity and conduct targeted investigations, arrange for buy/bust meetings with offenders, cruise the Internet for identification and apprehension purposes, or create their own Web sites to attract suspects.
Targeted Stings
Investigators commonly conduct targeted sting operations, which occur when a report is made to law enforcement regarding a crime that has occurred on the Internet. The investigator may acquire a user name and other information from the informant or victim of the crime and then pose as that individual while “chatting” on-line to further attract the perpetrator. In some cases, the victim actually chats with the offender under officer supervision. In this case, the officer or victim will attempt to get information necessary for a successful criminal prosecution of the offender. After the offender feels comfortable enough with the situation, a meeting is set up in which the offender is arrested. These targeted operations typically occur in cases of sex-based dialogue with children, fraud, and prostitution rings.
One example of a targeted sting occurred in 2002, when the FBI set up a cybersting called “Operation Candyman.” The FBI had been investigating a child pornography Web site that consisted of a membership of individuals who traded ideas and photos regarding the sexual abuse of children. An undercover FBI agent joined the Candyman Web site and participated in the exchange of information with Candyman's members. As a result of the information collected, subpoenas were issued to Internet providers for registration and user information; at least 89 people in 26 states were arrested, including a member of the clergy, a nurse, a school bus driver, and a member of law enforcement. The Candyman Web site had an estimated 7,000 members from at least 10 countries.
...
- Aggression
- Aggression: Biological Theories
- Aggression: Evolutionary and Anthropological Theories
- Aggression: Feminist Perspective
- Aggression: Sociological Theories
- Alcohol and Aggression
- Antisocial Personality Disorder
- Batterers and Abusive Partners
- Cycle Theory of Violence
- Elder Abuse
- Family Violence
- Homicide
- Mass Violence
- Media, Violence in the
- Motives for Murder
- Paraphilia
- Pedophilia
- Police Brutality
- Predicting Violent Behavior
- Psychopaths
- Rape
- Road Rage
- Robbery
- Serial Murder
- Sexual Offenses
- Stalking
- Violent Behavior: A Psychological Case Study
- Violent Behavior: Personality Theories
- Violent Behavior: Psychoanalytic Theories
- Women and Violence
- Criminal Investigation
- Ballistics
- Criminal Justice Practitioner
- Criminalistics
- Cyberstings
- False Confessions
- False Memory Syndrome
- FBI Top 10 Most Wanted List
- Federal Bureau of Investigation (FBI)
- Forensic Science
- Geographic Profiling
- Predicting Violent Behavior
- Prevention of Crime and Violent Behavior
- Profiling
- Signature Killers
- Threat Assessment
- Uniform Crime Reports (UCR)
- ViCLAS
- Victimology
- Cults
- Death Penalty
- Family Violence
- Battered Child Syndrome
- Battered Woman's Syndrome
- Batterers and Abusive Partners
- Child Abuse
- Child Killers
- Children as Victims of Sex Crimes
- Cycle Theory of Violence
- Elder Abuse
- Exploitation of Children
- Family Homicide
- Family Violence
- Gender Violence
- Homicide
- MacDonald, Jeffery Robert
- Methods of Murder
- Munchausen Syndrome by Proxy
- Murder-Suicide
- Poisoners
- Rape
- Simpson, O. J.
- Victimology
- Violent Behavior
- Women and Violence
- Yates, Andrea
- Forensic Science
- Gangs
- Government-Sanctioned Violence
- Homicide
- Aeronautical Mass Murder
- Arson
- Assassins
- Child Killers
- Death Penalty
- Family Homicide
- Homicide
- Homicide, Motivation for Murder
- Homicide, Perceptions of
- Homicide: Types of, and Degrees of Murder
- Juvenile Killers
- Lust Murder
- Mass Murder
- Mass Violence
- Medical Murders
- Motives for Murder
- Paraphilia
- Poisoners
- Poisoning: Medical Settings
- Product Tampering
- Psychopaths
- Rippers
- School Shootings
- Serial Murder
- Signature Killers
- Spree Murders
- Stalking
- Trophy Taking
- Vampires, Werewolves, and Witches
- Vehicular Homicide
- Victimology
- Workplace Violence and Homicide
- Juvenile Crime
- Kidnapping
- Legal Response to Violent Crime
- Brady Bill
- Brawner Test
- Court-Mandated Treatment
- Court-Ordered Psychological Assessments
- Courts, Organization of
- Cyberstings
- Gun Control
- Homicide, Types of, and Degrees of Murder
- Jurisdiction
- M'Naughten Rule
- Megan's Law
- Not Guilty by Reason of Insanity (NGRI)
- Prevention of Crime and Violent Behavior
- Self-Defense, Actions Taken in
- Sex Offender Registry
- Tarasoff Decision
- Three Strikes and You're Out!
- Victim and Witness Protection Act of 1982 (VWPA)
- Victim Compensation for Violent Crimes
- Victimology
- Victims of Crime Act, 1984 (VOCA)
- Mass Murder
- Aeronautical Mass Murder
- Arson
- Bin Laden, Osama
- Columbine/Littleton School Shooting
- Ethnic Cleansing
- Ferguson, Colin
- Genocide
- History of Violence in Religions
- Huberty, James Oliver
- In Cold Blood
- Jonesboro, Arkansas School, Shooting
- Kinkel, Kipland (Kip)
- MacDonald, Jeffrey
- Manson, Charles/The Manson Family
- Mass Murder
- Mass Violence
- McVeigh, Timothy
- Media, Violence in the
- Nichols, Terry
- Oklahoma City Bombing
- School Shootings
- St. Valentine's Day Massacre
- Terrorism
- War Atrocities
- Workplace Homicide/Violence
- Yates, Andrea
- Motives for Violence
- Aggravating and Mitigating Circumstances
- Aggression
- Alcohol and Aggression
- Batterers and Abusive Partners
- Beltway Snipers
- Cycle Theory of Violence
- Drug Trade
- Family Violence
- Gender Violence
- Helter-Skelter
- Homicide, Motivation for Murder
- Less-Dead
- Medical Murders
- Motives for Murder
- Munchausen Syndrome by Proxy
- Paraphilia
- Pedophilia
- Predicting Violent Behavior
- Profiling
- Rape
- Road Rage
- Robbery
- Serial Murder
- Sexual Offenses
- Substance Abuse and Homicide
- Vehicular Homicide
- Vigilantism
- Organized Crime
- Police and Violence
- Psychological Theories and Diagnoses for Violent Behavior
- Aggression: Psychological Theories
- Antisocial Personality Disorder
- Arsonist's Portrait
- Attachment Deficiency and Violence
- Brawner Test
- Court-Ordered Psychological Assessment
- Diagnostic and Statistical Manual of Mental Disorders (DSM)
- Jekyll and Hyde Syndrome
- Juvenile Firesetters
- Less-Dead
- M'Naughten Rule
- MacDonald Triad
- Mentally Disordered Offenders
- Motives for Murder
- Paraphilia
- Pedophilia
- Predicting Violent Behavior
- Psychopathology Checklist-Revised (PCL-R)
- Psychopaths
- Psychosocial Risk Factors for Violent Behavior
- Violence: Phenomenology
- Violent Behavior: A Psychological Case Study
- Violent Behavior: Personality Theories
- Violent Behavior: Psychoanalytic Theories
- XYY Syndrome
- Serial Murder
- Serial Murderers
- Albright, Charles
- Bathory, Countess Elizabeth
- Beck, Martha, and Ray Fernandez
- Beltway Snipers
- Berkowitz, David Richard
- Bernardo, Paul, and Karla Homolka
- Bundy, Theodore “Ted”
- Chikatilo, Andrei
- Dahmer, Jeffrey
- DeSalvo, Albert Henry
- Dodd, Westley Allan
- Gray, Dana Sue
- Hoch, Johann Otto (Bluebeard)
- Hog Trail Killings
- Jack the Ripper
- Jones, Genene
- Kaczynski, Theodore
- Kevorkian, Jack
- Lake, Leonard, and Charles Ng
- Landru, Henri Desiré
- Manson, Charles
- Milat, Ivan
- Parker, Bonnie, and Clyde Barrow
- Ramirez, Richard
- Sells, Tommy Lynn
- Williams, Wayne
- Zebra Killings
- Zodiac Murders
- Sex Crimes
- Terrorism
- Victimology
- Aggression: Feminist Perspective
- Battered Child Syndrome
- Battered Woman's Syndrome
- Batterers and Abusive Partners
- Elder Abuse
- Family Violence
- Gender Violence
- Predicting Violent Behavior
- Prevention of Crime and Violent Behavior
- Profiling
- Rape
- Robbery
- Threat Assessment
- Victim and Witness Protection Act (1984)
- Victim Compensation for Violent Crimes
- Victimology
- Victims of Crime Act (1984)
- Vigilantism
- Violent Crime
- Aeronautical Mass Murder
- Aggression
- Air Rage
- Antisocial Personality Disorder
- Arson
- Battered Child Syndrome
- Battered Woman's Syndrome
- Batterers and Abusive Partners
- Child Abuse
- Child Killers
- Community Attitudes Toward Violent Crime
- Cycle Theory of Violence
- Death Penalty
- Drug Trade
- Elder Abuse
- Family Homicide
- Family Violence
- Gangs
- Gender Violence
- Homicide
- Juvenile Firesetters
- Juvenile Killers
- Juvenile Offenders
- Lust Murder
- Mass Murder
- Mass Violence
- Media, Violence in the
- Medical Murders
- Methods of Murder
- Motives for Murder
- Murder-Suicide
- Neo-Nazi Skinheads
- Organized Crime
- Paraphilia
- Pedophilia
- Poisoners
- Poisoning: Medical Settings
- Police Brutality
- Predicting Violent Behavior
- Product Tampering
- Psychopaths
- Psychosocial Risk Factors for Violent Behavior
- Rape
- Rippers
- Road Rage
- Robbery
- School Shootings
- Serial Murder
- Sex Offenders
- Sexual Offenses
- Signature Killers
- Stalking
- Stranger Violence
- Suicide by Cop
- Team Killers
- Terrorism
- Trophy Taking
- Uniform Crime Reports (UCR)
- Vampires, Werewolves, and Witches
- ViCLAS
- Victimology
- Vigilantism
- Violent Behavior
- Violent Female Juvenile Offenders
- War Atrocities
- White Supremacists
- Women and Violence
- Workplace Violence and Homicide
- XYY Syndrome
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches