Tracking cyberstalkers: a cryptographic approach

  • Authors:
  • Mike Burmester;Peter Henry;Leo S. Kermes

  • Affiliations:
  • Florida State University, Tallahassee, FL;Florida State University, Tallahassee, FL;Florida State University, Tallahassee, FL

  • Venue:
  • ACM SIGCAS Computers and Society
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Stalking is a pattern of behavior over time in which a stalker seeks to gain access to, or control over, an unwilling victim. Such actions range from the benign to the malicious and may cause emotional distress or harm to the victim. With the widespread adoption of new technologies, new forums of Internet-mediated discourse now exist which offer stalkers unprecedented scope to locate and exert influence over victims. Cyberstalking, the convergence of stalking and cyberspace, has created new challenges for the prevention, detection, and prosecution of this new phenomenon as the traditional methods of detection by witnesses and enforcement through physical restraining orders often are inadequate.In this paper we suggest a cryptographic approach for tracking cyberstalkers. We first define the threat model in terms of the profile of a cyberstalker, as well as legal and law enforcement constraints. We then describe a monitoring system that addresses the basic admissibility requirements of our threat model, by capturing and verifying circumstantial evidence for use in cyberstalking investigations.