7 Types of Cyber Misbehavior

 

The internet is a vast landscape of information and behind each digital device is a person. The virtual world often seems non-human. It is filled with emojis and avatars that portray human emotions and physical touch. The anonymity could be compared to a giant party on Halloween night embodying an environment of both fun and danger. Do our responsibilities to one another as human beings become more accountable with anonymity, or does anonymity increase the likelihood of cyber misbehavior? Cyber misbehavior can easily be summed up as cyber “harassment” or “bullying” which, for many, are perceived as casual occurrences. The reality is that the U.S. Justice Department has defined cyber misbehavior with federal statutes.


  • Cyber Bullying

Bullying is a type of unwanted behavior of aggression and intimidation. Usually, this conduct is common among school children but happens frequently online. When bullying behavior occurs online it becomes cyberbullying. Not all cyberbullying constitutes federal criminal conduct. 

  • Cyber Threats

“Cyber threat” is a broad term covering a range of online threats. Threats may include behavior, online security, and physical digital devices. 

  • Cyber Stalking

California State law describes stalking as willful, malicious, and repeated following or harassment combined with threats that cause fear in the victim or their family. (California Penal Code 646.9). Cyberstalking is stalking that occurs in the virtual world. 

  • Cyber Harassment

Harassment Is not equated with cyberstalking. It is harassment without a credible threat and fear for a person’s safety. Cyber harassment has less serious consequences. Even so, cyber harassment can be very intrusive because harassment comes from one or countless amounts of people. Often with doxing, personal information is shared such that numerous contacts from many sources will target one victim. 

  • Cyber Extortion

Oftentimes extortion that happens in the virtual world threatens to damage virtual information or property in exchange for payment. It is also known as “cryptoviral extortion” or “ransomware.”  

  • Sextortion

This is a form of cyber extortion. Sometimes online users create bonds over the internet that include the release of intimate information or photos. Online dating is a common example of this occurrence. Other people simply use flattery or manipulation to gain intimate personal media. Sextortion is the demand for sexual photos or acts in exchange for discretion. The threat may involve sharing nude photos or intimate content to online platforms, friends, family, employers, or others. without the victim’s consent. 

  • Revenge Porn/Non-Consensual Pornography

Although the explicit photographs or pornography may have been produced during a consensual relationship at one point, revenge porn is released at the extorter’s discretion without the victim’s consent. This type of incident may happen after a breakup. However non-consensual pornography can also occur discreetly via a hidden camera. This tactic is used to humiliate a victim and damage their reputation. Often an extorter will share the pornography on virtual platforms the victim frequents, or with people who know the victim.

There are federal statutes to address many of the listed cyber misbehaviors. 

18 U.S.C. § 2261A: Cyberstalking

18 U.S.C. § 875: Threats and extortion

47 U.S.C. § 223: Obscene or harassing telephone calls 

18 U.S.C. § 2251: Production of child pornography 

18 U.S.C. § 2422(b): Enticement/coercion of a minor

18 U.S.C. § 1030: Computer hacking

18 U.S.C. § 1952: Travel Act extortion 

To visit the Safety Section of the NCTCC App and get more information on Stalking/Harassment, download the NCTCC Victim Service Mobile Application at nctcc.org/nctcc-app or search for “nctcc” in the Google Play or Apple Store.


 
Previous
Previous

11 Ways Your Cell Phone Can Be Used As a Safety Device

Next
Next

12 Useful Apps & Tools to Defend Against Online Harassment